Configuring Peer-To-Peer Blocking And Instant Messaging - Cisco QuickVPN - PC Administration Manual

Sa 500 series security appliances administration guide
Hide thumbs Also See for QuickVPN - PC:
Table of Contents

Advertisement

Intrusion Prevention System

Configuring Peer-to-Peer Blocking and Instant Messaging

STEP 3
Configuring Peer-to-Peer Blocking and Instant Messaging
STEP 1
STEP 2
STEP 3
Cisco SA 500 Series Security Appliances Administration Guide
Detect and Prevent: Choose this option to check for and prevent attacks on
this protocol. Upon detection, a message is logged and a preventative
action is taken.
For IPS messages to be logged, you must configure IPS as the facility. For more
information, see
Logs Facility, page 211
Click Apply to save your settings, or click Reset to revert to the saved settings.
You can configure the appliance to block Peer-to-Peer (P2P) and Instant Message
(IM) traffic on the security appliance. From the IM and P2P blocking page, you can
specify what type of P2P and IM applications (such as Gnutella, BitTorrent, AOL, or
Yahoo) are blocked.
Click IPS on the menu bar, and then click IPS> IM and P2P Blocking in the
navigation tree.
Select one of these options for each Peer-to-Peer and Instant Messaging services
listed in the P2P and IM Blocking areas:
Disabled: Choose this option to disable checking for this service.
Detect Only: Choose this option to check for attacks on this service and to
log a message upon detection.This option is mostly used for
troubleshooting purposes
Detect and Prevent: Choose this option to check for and prevent attacks
for this service. Upon detection, a message is logged and a preventative
action is taken.
For IPS messages to be logged, you must configure IPS as the facility. For more
information, see
Logs Facility, page 211
Click Apply to save your settings, or click Reset to revert to the saved settings.
6
151

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents