First we should enable HTTP AIC inspection with the commands you have provided and then configure a sig with the one that I have specified.
With regards Kings On Mon, May 9, 2011 at 9:52 AM, Andrew Wurster <[email protected]>wrote: > i was able to complete Yusuf's lab #1 today. i took a few screenshots but > unfortunately it looks like they didn't save all the clicks i had made, so i > added some highlights. and here's the CLI it generates: > > service signature-definition sig2 >> application-policy >> http-policy >> http-enable true >> max-outstanding-http-requests-per-connection 5 >> exit > > > for the record, kings, while i realize we are showing the same thing, the > table below is completely greek to me :) . does this feature apply to a > single signature, or a set of signatures, or what? > > cheers, > > andrew > > > On Sat, May 7, 2011 at 9:00 PM, Kingsley Charles < > [email protected]> wrote: > >> Configure an AIC HTTP signature. and use the following: >> >> >> Parameter >> Description >> >> Signature Type >> >> Specifies the type of AIC signature. >> >> Content Types >> >> AIC signature that deals with MIME types: >> >> •Define Content Type—Associates actions such as denying a specific MIME >> type (image/gif), defining a message-size violation, and determining that >> the MIME-type mentioned in the header and body do not match. >> >> •Define Recognized Content Types—Lists content types recognized by the >> sensor. >> >> Define Web Traffic Policy >> >> Specifies the action to take when noncompliant HTTP traffic is seen. Alarm >> on Non-HTTP Traffic Yes | No enables the signature. This signature is >> disabled by default. >> >> Max Outstanding Requests Overrun >> >> Maximum allowed HTTP requests per connection (1 to 16). >> >> Msg Body Pattern >> >> Uses Regex to define signatures that look for specific patterns in the >> message body. >> >> Request Methods >> >> AIC signature that allows actions to be associated with HTTP request >> methods: >> >> •Define Request Method—get, put, and so forth. >> >> •Recognized Request Methods—Lists methods recognized by the sensor. >> >> Transfer Encoding >> >> AIC signature that deals with transfer encodings: >> >> •Define Transfer Encoding—Associates an action with each method, such as >> compress, chunked, and so forth. >> >> •Recognized Transfer Encodings—Lists methods recognized by the sensor. >> >> •Chunked Transfer Encoding—Error specifies actions to be taken when a >> chunked encoding error is seen. >> >> >> >> With regards >> Kings >> >> >> >> On Sun, May 8, 2011 at 6:59 AM, Adil Pasha <[email protected]> wrote: >> >>> Does anyone know or have screen shots for IPS Tuning question in YB Lab 1 >>> - Question 4.1 ? >>> >>> I could not figure out how to configure the IPS. >>> >>> The question is for sig2 and states: >>> >>> "Enable HTTP application policy enforcement, allowing a maximum of five >>> HTTP requests to the server at any given time." >>> >>> Appreciate all the help in advance. >>> >>> Best Regards. >>> ______________________ >>> Adil >>> >>> >>> _______________________________________________ >>> For more information regarding industry leading CCIE Lab training, please >>> visit www.ipexpert.com >>> >>> Are you a CCNP or CCIE and looking for a job? Check out >>> www.PlatinumPlacement.com >>> >> >> >> _______________________________________________ >> For more information regarding industry leading CCIE Lab training, please >> visit www.ipexpert.com >> >> Are you a CCNP or CCIE and looking for a job? Check out >> www.PlatinumPlacement.com >> > >
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com Are you a CCNP or CCIE and looking for a job? Check out www.PlatinumPlacement.com
