8-6
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2
OL-29168-01
Chapter8 Configuring Event Action Rules
Event Actions
Note
You cannot use modify-packet-inline as an action when adding event action filters or
overrides.
Other Actions
request-block-connection—Sends a request to ARC to block this c onnection. You must have
blocking devices configured to implement this action.
Note
Connection blocks and network blocks are not supported on adaptive security appliances.
Adaptive security appliances only support host blocks with additional connection
information.
Note
IPv6 does not support request-block-connection.
request-block-host—Sends a request to ARC to block this attacker host. You must have blocking
devices configured to implement this action.
Note
IPv6 does not support request-block-host.
request-rate-limit—Sends a rate limit request to ARC to perform rate limiting. You must have rate
limiting devices configured to implement this action.
Note
The request-rate-limit action applies to a select set of signatures.
Note
IPv6 does not support request-rate-limit.
reset-tcp-connection—Sends TCP resets to hijack and terminate the TCP flow. The
reset-tcp-connection action only works on TCP signatures that analyze a single connection. It does
not work for sweeps or floods.
Understanding Deny Packet Inline
For signatures that have deny-packet-inline configured as an action or for an event action override that
adds deny-packet-inline as an action, the following actions may be taken:
dropped-packet
denied-flow
tcp-one-way-reset-sent
The deny-packet-inline action is represented as a dropped packet action in the alert. When a
deny-packet-inline occurs for a TCP connection, it is automatically upgraded to a
deny-connection-inline action and seen as a denied flow in the alert. If the IPS denies just one packet,
the TCP continues to try to send that same packet again and again, so the IPS denies the entire connection
to ensure it never succeeds with the resends.