
Cisco Intrusion Prevention System Security Target
functionality independent of another traffic filtering device such as a firewall or router.
IPS SSP modules (hardware or software) support inline traffic inspection by working in
consort with their host ASA firewall.
Offers promiscuous mode inspection. In this mode a duplicate stream of traffic is sent to
the TOE. Unlike operation in inline mode, the TOE operating in promiscuous mode can
only block traffic by instructing the router/switch appliance to shun the traffic or by
resetting a connection on the switch/router.
Supports more than 3700 signatures from the same signature database available for Cisco
IPS.
Cisco anomaly detection provides powerful protection against day-zero attacks. The
TOE learns the normal behavior on the network and creates an alert when it sees
anomalous activities in the network. This provides protection against new threats even
before signatures are available.
Identifies the source of and blocks denial of service (DoS), distributed denial of service
(DDoS), SYN flood, and encrypted attacks with Cisco Global Correlation.
Uses patented anti-evasion technology to defend and monitor against worms, viruses,
Trojans, reconnaissance attacks, spyware, botnets, phishing, peer to peer attacks, and
malware, as well as numerous evasion techniques.
1.2.2 TOE Components
The descriptions of the Cisco IPS models below is provided to highlight key distinctions between
the models, however these distinctions are not security-relevant with respect to the security
requirements of the NDPP.
1.2.2.1 Cisco IPS 4300 and 4500 Sensors
The Cisco IPS 4300 and 4500 Sensors are standalone IPS appliances that provide hardware-
accelerated deep packet inspection and automated threat management. Deep packet inspection
can be done on encapsulated traffic, including generic routing encapsulation (GRE),
Multiprotocol Label Switching (MPLS), 802.1q, IPv4 in IPv4, IPv4 in IPv6, and Q-in-Q double
VLAN.
Comentarios a estos manuales