Chapter 10 Configuring Global Correlation

Troubleshooting Global Correlation

Step 7 Press Enter to apply your changes or enter no to discard them.

For More Information

For more information about participating in the SensorBase Network, see Participating in the

SensorBase Network, page 10-2.

Troubleshooting Global Correlation

Make sure you observe the following when configuring global correlation:

Because global correlation updates occur through the sensor management interface, firewalls must allow port 443/80 traffic.

You must have an HTTP proxy server or a DNS server configured to allow global correlation features to function.

If you have an HTTP proxy server configured, the proxy must allow port 443/80 traffic from IPS systems.

You must have a valid IPS license to allow global correlation features to function.

Global correlation features only contain external IP addresses, so if you position a sensor in an internal lab, you may never receive global correlation information.

Make sure your sensor supports the global correlation features.

Make sure your IPS version supports the global correlation features.

For More Information

For the procedure for configuring a DNS or HTTP proxy server, see Configuring the DNS and Proxy Servers for Global Correlation and Automatic Update, page 3-10.

For the procedure for obtaining an IPS license, see Installing the License Key, page 3-54.

Disabling Global Correlation

If your sensor is deployed in an environment where a DNS server or HTTP proxy server is not available, you may want to disable global correlation so that global correlation health does not appear as red in the overall sensor health, thus indicating a problem. You can also configure sensor health to exclude global correlation status.

The following options apply:

global-correlation-inspection {on off}—Turns global correlation inspection on or off. When turned on, the sensor uses updates from the SensorBase network to adjust the risk rating. The default is on.

reputation-filtering {on off}—Turns reputation filtering on or off. When turned on, the sensor denies access to malicious hosts that are listed in the global correlation database. The default is on.

network-participation—Sets the level of network participation. The default is off.

off—No data is contributed to the SensorBase network.

partial—Data is contributed to the SensorBase network but potentially sensitive information is withheld.

 

 

Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2

 

 

 

 

 

 

OL-29168-01

 

 

10-13

 

 

 

 

 

Page 347
Image 347
Cisco Systems IPS4510K9 manual Troubleshooting Global Correlation, Disabling Global Correlation, 10-13

IPS4510K9 specifications

Cisco Systems has long been a leading player in network security, and its IPS (Intrusion Prevention System) series is a testament to its commitment to safeguarding digital environments. Among its notable offerings are the IPS4510K9 and IPS4520K9 models, both designed to provide advanced threat protection for mid-sized to large enterprise networks.

The Cisco IPS4510K9 and IPS4520K9 are distinguished by their cutting-edge features that help organizations defend against a myriad of cyber threats. These systems utilize a multi-layered approach to security, integrating intrusion prevention, advanced malware protection, and comprehensive visibility across the network.

One of the primary characteristics of the IPS4510K9 is its high performance. It boasts a throughput of up to 1 Gbps, making it suitable for environments that demand rapid data processing and real-time responses to threats. The IPS4520K9, on the other hand, enhances that capability with improved throughput of up to 2 Gbps, accommodating larger enterprises with heavier network traffic. These models are equipped with powerful processors that support complex signature matching and can intelligently distinguish between legitimate traffic and potential threats.

In addition to performance, both models are designed with scalability in mind. They can be easily integrated into existing Cisco infrastructures. This facilitates a seamless enhancement of security without causing significant interruptions to ongoing operations. Moreover, they offer flexible deployment options, allowing organizations to operate them inline or out of band depending on their specific needs.

The Cisco IPS4510K9 and IPS4520K9 leverage advanced detection technologies, utilizing a variety of signature types and heuristic analysis to detect known and unknown threats effectively. They are equipped with real-time alerting and reporting capabilities, giving security teams immediate visibility into potential breaches and enabling them to respond swiftly.

Furthermore, both models support a range of management options through the Cisco Security Manager, allowing for centralized administration, streamlined policy management, and enhanced monitoring capabilities. Automated updates ensure the systems remain current with the latest threat intelligence, vital for staying ahead of evolving cyber threats.

In summary, the Cisco Systems IPS4510K9 and IPS4520K9 represent powerful solutions for organizations seeking robust intrusion prevention capabilities. With their high performance, scalability, and advanced detection technologies, these systems are essential tools in the ever-changing landscape of cybersecurity, providing enterprises with the peace of mind needed to operate securely in today's digital world.