How can you configure your Cisco IPS Sensor to identify and stop this activity?

You think users on your corporate network are disguising the use of file-sharing applications by tunneling the traffic through port 80. How can you configure your Cisco IPS Sensor to identify and stop this activity?

You think users on your corporate network are disguising the use of file-sharing applications by tunneling the traffic through port 80. How can you configure your Cisco IPS Sensor to identify and stop this activity?

A.
Enable all signatures in the Service HTTP engine. Then create an event action override that adds the Deny Packet Inline action to events triggered by these signatures if the traffic originates from your corporate network.

B.
Enable both the HTTP application policy and the alarm on non-HTTP traffic signature.

C.
Assign the Deny Packet Inline action to all signatures in the Service HTTP engine.

D.
Enable the alarm for the non-HTTP traffic signature. Then create an Event Action Override that adds the Deny Packet Inline action to events triggered by the signature if the traffic originates from your corporate network.

E.
Enable all signatures in the Service HTTP engine.



Leave a Reply 0

Your email address will not be published. Required fields are marked *