I would like to know the following ASA and SSM-40 configuration meeting the standard configuration and please let me know
how do i further do advance config to get out of this IPS module.
Also I am using IME 6.2 tool to monitor ASA -SSM 40 but it is giving all basic monitoring data, do we need to do any further config on ASA-SSM 40 so it
it will show all critical logs.
Finally i am seeing the below related to IPS license expired error.
***LICENSE NOTICE*** The license key on the SSM-IPS40 has expired. The system will continue to operate with the currently installed signature set. A valid license must be obtained in order to apply signature updates. Please go to http://www.cisco.com/go/license to obtain a new license or install a license. HQ-IPS-SSM40-ASA5520#
Your configuration is very standard and should allow the AIP-SSM to successfully inspect traffic traversing the ASA.
I am not sure what you are asking when you say,"it will show all critical logs." IPS Manager Express (IME) is designed to retrieve all signature related (alert) events from Cisco IPS sensors (unless the managed sensor is configured to exclude specific severity levels). IME will not retrieve system level (error) events; this is not currently possible.
In regard to your licensing issue, you will need to have the AIP-SSM's serial number added to a valid support contract with signature update support. This will allow you to apply an updated license which will in turn allow you to update the signatures. If the AIP-SSM is currently on a valid support contract, you can attempt to retrieve an updated license for the sensor via IME. Navigate to the following:
Choose "Cisco.com" for the "Update From:" option and then click "Update License".
BenefitsDocumentationPrerequisiteImage Download LinksLimitationsSupported PlatformsLicense RequirementsTopologyStep-By-Step ConfigurationConfigure Virtual ServiceActivate the virtual service and configure guest IPsConfiguring UTD (Service Plane)Configurin...
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...