Configuring The Maximum Number Of Blocking Interfaces - Cisco 4215 - Intrusion Detection Sys Sensor Configuration Manual

Configuration guide
Hide thumbs Also See for 4215 - Intrusion Detection Sys Sensor:
Table of Contents

Advertisement

Configuring Blocking Properties
Enable blocking event and error logging:
Step 6
sensor(config-net-gen)# log-all-block-events-and-errors true
Verify that logging is enabled:
Step 7
sensor(config-net-gen)# show settings
general
-----------------------------------------------
Exit network access mode:
Step 8
sensor(config-net-gen)# exit
sensor(config-net)# exit
Apply Changes:?[yes]:
Press Enter to apply the changes or type
Step 9

Configuring the Maximum Number of Blocking Interfaces

Use the max-interfaces command to configure the maximum number of interfaces for performing
blocks. For example, a PIX Firewall counts as one interface. A router with one interface counts as one,
but a router with two interfaces counts as two. You can configure up to 250 Catalyst 6K switches, 250
routers, and 250 firewalls.
The max-interfaces command configures the limit of the sum total of all interfaces and devices. In
addition to configuring the limit on the sum total of interfaces and devices, there is a fixed limit on the
number of blocking interfaces you can configure per device. Use the show settings command in network
access mode to view the specific maximum limits per device.
To configure the maximum number of blocking interfaces, follow these steps:
Log in to the CLI using an account with administrator privileges.
Step 1
Enter network access mode:
Step 2
sensor# configure terminal
sensor(config)# service network-access
Step 3
Enter general submode:
sensor(config-net)# general
Configure the maximum number of interfaces:
Step 4
sensor(config-net-gen)# max-interfaces 50
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 5.0
10-14
block-max-entries: 250 <defaulted>
max-interfaces: 250 <defaulted>
master-blocking-sensors (min: 0, max: 100, current: 0)
-----------------------------------------------
log-all-block-events-and-errors: true default: true
enable-nvram-write: false default: false
enable-acl-logging: false default: false
allow-sensor-block: false <defaulted>
block-enable: true <defaulted>
block-max-entries: 250 <defaulted>
max-interfaces: 250 <defaulted>
master-blocking-sensors (min: 0, max: 100, current: 0)
-----------------------------------------------
to discard them.
no
Chapter 10
Configuring Blocking
78-16527-01

Advertisement

Table of Contents
loading

Table of Contents