4-14
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2
OL-29168-01
Chapter4 Configuring Interfaces
Configuring Promiscuous Mode
media-type: tx <protected>
description: <defaulted>
admin-state: disabled <protected>
duplex: auto <defaulted>
speed: auto <defaulted>
alt-tcp-reset-interface
-----------------------------------------------
none
-----------------------------------------------
-----------------------------------------------
-----------------------------------------------
-----------------------------------------------
sensor(config-int-phy)#
Step 14
Exit interface submode.
sensor(config-int-phy)# exit
sensor(config-int)# exit
Apply Changes:?[yes]:
Step 15
Press Enter to apply the changes or enter
no
to discard them.
For More Information
For a list of possible interfaces for your sensor, see Interface Support, page 4-6.
For the procedure for sending traffic to the ASA 5500-X IPS SSP, see Creating Virtual Sensors for
the ASA 5500-X IPS SSP, page 18-4.
For the procedure for sending traffic to the ASA 5585-X IPS SSP, see Creating Virtual Sensors for
the ASA 5585-X IPS SSP, page 19-4.
For more information on the alternate TCP reset interface, see Understanding Alternate TCP Reset
Interfaces, page 4-4 and Designating the Alternate TCP Reset Interface, page 4-5.
For the procedure for configuring inline VLAN pairs, see Configuring Inline VLAN Pairs,
page 4-22.
For the procedure for adding interfaces to virtual sensors, see Adding, Editing, and Deleting Virtual
Sensors, page 5-4.
Configuring Promiscuous Mode
This section describes promiscuous mode on the sensor, and contains the following topics:
Understanding Promiscuous Mode, page 4-14
Configuring Promiscuous Mode, page 4-15
IPv6, Switches, and Lack of VACL Capture, page 4-15

Understanding Promiscuous Mode

In promiscuous mode, packets do not flow through the sensor. The sensor anal yzes a copy of the
monitored traffic rather than the actual forwarded packet. The advantage of operating in promiscuous
mode is that the sensor does not affect the packet flow with the forwarded traffic. The disadvantage of
operating in promiscuous mode, however, is the sensor cannot stop malicious traffic from reaching its