14-5
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2
OL-29168-01
Chapter1 4 Configuring Attack Response Controller for Blocking and Rate Limiting
Understanding Service Policies for Rate Limiting
Tip
To check the status of the ARC, type show statistics network-access at the
sensor#
. The output shows
the devices you are managing, any active blocks and rate limits, and the status of all devices..
For More Information
For the procedure for configuring rate limiting on a router, see Configuring Blocking and Rate
Limiting Devices, page 14-21.
For the procedure for configuring a sensor to be a master blocking senso r, see Configuring the
Sensor to be a Master Blocking Sensor, page 14-28.
Understanding Service Policies for Rate Limiting
You must not apply a service policy to an interface/direction that is configured for rate limiting. If you
do so, the rate limit action will fail. Before configuring rate limits, confirm that there is no service policy
on the interface/direction, and remove it if one exists. The ARC does not remove the existing rate limit
unless it is one that the ARC had previously added.
Rate limits use ACLs, but not in the same way as blocks. Rate limits use acls and class-map entries to
identify traffic, and policy-map and service-policy entries to police the traffic.
Before Configuring ARC
Caution
Two sensors cannot control blocking or rate limiting on the same device. If this situation is needed,
configure one sensor as the master blocking sensor to manage the devices and the other sensors can
forward their requests to the master blocking sensor.
Note
When you add a master blocking sensor, you reduce the number of blocking devices per sensor. For
example, if you want to block on 10 security appliances and 10 routers with one blocking
interface/direction each, you can assign 10 to the sensor and assign the other 10 to a master blocking
sensor.
4002 UDP Flood Host UDP Yes none
6901 Net Flood ICMP Re ply ICMP No echo-reply
6902 Net Flood ICMP Request ICMP No echo-request
6903 Net Flood ICMP Any ICMP No None
6910 Net Flood UDP UDP No None
6920 Net Flood TCP TCP No None
3050 TCP HalfOpenSyn TCP No halfOpenSyn
Table14-1 Rate Limiting Signatures (continued)
Signature ID Signature Name Protocol
Destination IP
Address Allowed Data