Practical-7
Practical-7
Cisco developed its Cisco IOS software-based intrusion-prevention capabilities and Cisco IOS
Firewall with flexibility in mind, so that individual signatures could be disabled in case of false
positives. Generally, it is preferable to enable both the firewall and Cisco IOS IPS to support
network security policies. However, each of these features may be enabled independently and
on different router interfaces.
Signatures:
A signature is a set of rules that an IDS and an IPS use to detect typical intrusive activity, such
as DoS attacks. We can easily install signatures using IDS and IPS management software such
as Cisco IDM. Sensors enables us to modify existing signatures and define new ones.
As sensors scan network packets, they use signatures to detect known attacks and respond
with predefined actions. A malicious packet flow has a specific type of activity and signature,
and an IDS or IPS sensor examines the data flow using many different signatures. When an IDS
or IPS sensor matches a signature with a data flow, the sensor takes action, such as logging the
event or sending an alarm to IDS or IPS management software, such as the Cisco SDM
ISMAIL H P Page 1
SIC JOURNAL TYIT
We define some of the commands which will be used while configuring the Router for IPS
Example:
Router(config-ips-category)# category
ios_ips basic
ISMAIL H P Page 2
SIC JOURNAL TYIT
Configuring PC0
ISMAIL H P Page 3
SIC JOURNAL TYIT
Configuring PC1
Configuring SERVER0
ISMAIL H P Page 4
SIC JOURNAL TYIT
Configuring Router0
ISMAIL H P Page 5
SIC JOURNAL TYIT
Configuring Router1
ISMAIL H P Page 6
SIC JOURNAL TYIT
Configuring Router2
ISMAIL H P Page 7
SIC JOURNAL TYIT
We need to set the Routing table in all the Routers so that each node could send
and receive packets from others (RIP is set in all the Routers as follows)
Router0
Router1
ISMAIL H P Page 8
SIC JOURNAL TYIT
Router2
Now we can check the connectivity by sending ping commands from any node to any
other node
ISMAIL H P Page 9
SIC JOURNAL TYIT
Router#show version
We will get a message informing whether the security Package is enabled or not
As seen above the security package is not enabled, to enable the security feature,
type the following command in Router1
Router>enable
Router#
Router#show version
We will get a message informing whether the security package is enabled or not
ISMAIL H P Page 10
SIC JOURNAL TYIT
Router#
Router#
Router#clock set 11:47:56 MARCH 3 2020
Router#mkdir smile
Router#configure terminal
Router(config)#ip ips config location flash:smile
Router(config)#ip ips name iosips
Router(config)#ip ips notify log
Router(config)#ip ips signature-category
Router(config-ips-category)#category all
Router(config-ips-category-action)#retired true
Router(config-ips-category-action)#exit
Router(config)#interface Serial0/1/0
Router(config-if)#ip ips iosips out
Router(config-if)#
Router(config)#
ISMAIL H P Page 11
SIC JOURNAL TYIT
Router(config)#
Router(config)#ip ips signature-definition
Router(config-sigdef)#signature 2004 0
Router(config-sigdef-sig)#status
Router(config-sigdef-sig-status)#retired false
Router(config-sigdef-sig-status)#enabled true
Router(config-sigdef-sig-status)#exit
Router(config-sigdef-sig)#engine
Router(config-sigdef-sig-engine)#event-action produce-alert
Router(config-sigdef-sig-engine)#event-action deny-packet-inline
Router(config-sigdef-sig-engine)#exit
Router(config-sigdef-sig)#exit
Router(config-sigdef)#exit
Router(config)#
Now we need to verify the above IPS configuration, we do it first by pinging PC1
to SERVER and then from SERVER to PC1
PC1 to SERVER
ISMAIL H P Page 12
SIC JOURNAL TYIT
SERVER to PC1
Also we can observe the Syslog service in the SERVER to check the log activities
ISMAIL H P Page 13