Solution to be provided using NBAR IOS Techonology:
========================================

Are both solutions correct with respect to LAB requirements if we need to
block NIMDA attack on webserver ? Which one is the best solution ? What is
the difference between the following 2 configurations . In the question, it
has been said that the NIMDA traffic is already having a DSCP marking of 1 .


SOLUTION A:
===========
parameter-map type regex NBAR
pattern default\.ida
pattern cmd\.exe
pattern root\.exe

class-map match-all NBAR
match protocol http url NBAR
match dscp 1

policy-map SOLUTION
class NBAR
drop

int fa0/1
service-policy input SOLUTION
ip nbar protocol-discovery <----------- this command is important or not
???
ip add <a.b.c.d> <mask>
no sh




SOLUTION B:
==========

class-map match-any CMAP_ATTACK
match protocol http url "*default.ida*"
match protocol http url "*cmd.exe*"
match protocol http url "*root.exe*"

class-map match-all NIMDA
match dscp 1
match class CMAP-ATTACK

policy-map SOLUTION
class NIMDA
drop


int fa0/1
service-policy input SOLUTION
ip nbar protocol-discovery <----------- this command is important or not
???
ip add <a.b.c.d> <mask>
no sh



regards,
Kamran.
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to