14-6
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2
OL-29168-01
Chapter14 Co nfiguring Attack Response Controller for Blocking and Rate Limiting
Supported Devices
Before you configure the ARC for blocking or rate limiting, make sure you do the following:
Analyze your network topology to understand which devices should be blocked by which sensor,
and which addresses should never be blocked.
Gather the usernames, device passwords, enable passwords, and connections types (Telnet or SSH)
needed to log in to each device.
Know the interface names on the devices.
Know the names of the Pre-Block ACL or VACL and the Post-Block ACL or VACL if needed.
Understand which interfaces should and should not be blocked and in w hich direction (in or out).
You do not want to accidentally shut down an entire network.
For More Information
For the procedure for configuring the master blocking sensor, see Configuring the Sensor to be a Master
Blocking Sensor, page 14-28.
Supported Devices
Caution
If the recommended limits are exceeded, the ARC may not apply blocks in a tim ely manner or may not
be able to apply blocks at all.
By default, the ARC supports up to 250 devices in any combination. The following devices are supported
for blocking by the ARC:
Cisco series routers using Cisco IOS 11.2 or later (ACLs):
Cisco 1600 series router
Cisco 1700 series router
Cisco 2500 series router
Cisco 2600 series router
Cisco 2800 series router
Cisco 3600 series router
Cisco 3800 series router
Cisco 7200 series router
Cisco 7500 series router
Catalyst 5000 switches with RSM with IOS 11.2(9)P or later (ACLs)
Catalyst 6500 switches and 7600 routers with IOS 12.1(13)E or later (ACLs)
Catalyst 6500 switches 7600 routers with Catalyst software version 7.5(1) or la ter (VACLs)
Supervisor Engine 1A with PFC
Supervisor Engine 1A with MSFC1
Supervisor Engine 1A with MFSC2
Supervisor Engine 2 with MSFC2
Supervisor Engine 720 with MSFC3