[nsp] Cisco IOS IDS Signature

Church, Chuck cchurch at wamnetgov.com
Thu Apr 15 09:25:11 EDT 2004


I'm sure you've already considered this, but wouldn't blocking
destination TCP 443 cover 99% of the SSL sites out there?   


Chuck Church
Lead Design Engineer
CCIE #8776, MCNE, MCSE
Wam!Net Government Services - Design & Implementation Team
13665 Dulles Technology Dr. Ste 250
Herndon, VA 20171
Office: 703-480-2569
Cell: 703-819-3495
cchurch at wamnetgov.com
PGP key:
http://pgp.mit.edu:11371/pks/lookup?op=index&search=cchurch%40wamnetgov.
com
-----Original Message-----
From: Christopher J. Wolff [mailto:chris at bblabs.com] 
Sent: Thursday, April 15, 2004 12:05 AM
To: cisco-nsp at puck.nether.net
Subject: [nsp] Cisco IOS IDS Signature

Hello,

I'm trying to identify the IOS IDS signature that would prevent a web
surfer from accessing SSL sites, for example, their banking site.  The
only one that jumps out at me is 3050, half open SYN.  Thank you very
much for your assistance.

http://www.cisco.com/en/US/partner/products/sw/secursw/ps2113/products_d
ata_
sheet09186a008014c532.html

Regards,
Christopher J. Wolff, VP CIO
Broadband Laboratories, Inc.
http://www.bblabs.com


_______________________________________________
cisco-nsp mailing list  cisco-nsp at puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



More information about the cisco-nsp mailing list