CHAPT ER
7-1
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2
OL-29168-01
7
Defining Signatures
This chapter describes how to define and create signatures. It contains the following sections:
Signature Definition Notes and Caveats, page 7-1
��
Understanding Policies, page 7-1
Working With Signature Definition Policies, page 7-2
Understanding Signatures, page 7-3
Configuring Signature Variables, page 7-4
Configuring Signatures, page7-6
Creating Custom Signatures, page 7-40

Signature Definition Notes and Caveats

The following notes and caveats apply to defining signatures:
You must preface signature variables with a dollar ($) sign to indicate that you are using a variable
rather than a string.
We recommend that you do NOT change the promiscuous delta setting for a signature.
The parameters tcp-3-way-handshake-required and tcp-reassembly-mode only impact sensors
inspecting traffic in promiscuous mode, not inline mode. To configure asymmetric options for
sensors inspecting inline traffic, use the inline-TCP-evasion-protection-mode parameter.
A custom signature can affect the performance of your sensor. Test the custom signature against a
baseline sensor performance for your network to determine the overall impact of the signature.

Understanding Policies

You can create multiple security policies and apply them to individual virtual sensors. A security policy
is made up of a signature definition policy, an event action rules policy, and an anomaly detection policy.
Cisco IPS contains a default signature definition policy called sig0, a default event action rules policy
called rules0, and a default anomaly detection policy called ad0. You can assign the default policies to
a virtual sensor or you can create new policies. The us e of multiple security policies lets you create
security policies based on different requirements and then apply these customized policies p er VLAN or
physical interface.