Solution to be provided using NBAR IOS Techonology: ========================================
Are both solutions correct with respect to LAB requirements if we need to block NIMDA attack on webserver ? Which one is the best solution ? What is the difference between the following 2 configurations . In the question, it has been said that the NIMDA traffic is already having a DSCP marking of 1 . SOLUTION A: =========== parameter-map type regex NBAR pattern default\.ida pattern cmd\.exe pattern root\.exe class-map match-all NBAR match protocol http url NBAR match dscp 1 policy-map SOLUTION class NBAR drop int fa0/1 service-policy input SOLUTION ip nbar protocol-discovery <----------- this command is important or not ??? ip add <a.b.c.d> <mask> no sh SOLUTION B: ========== class-map match-any CMAP_ATTACK match protocol http url "*default.ida*" match protocol http url "*cmd.exe*" match protocol http url "*root.exe*" class-map match-all NIMDA match dscp 1 match class CMAP-ATTACK policy-map SOLUTION class NIMDA drop int fa0/1 service-policy input SOLUTION ip nbar protocol-discovery <----------- this command is important or not ??? ip add <a.b.c.d> <mask> no sh regards, Kamran.
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com
