Compatible 6500 IOS version to support IDSM-2 Inline mode

The 6500 model WS-SUP720-3BXL with IOS version 12.2(18)SXD4,
and IDS card WS-SVC-IDSM-2 with sw 5.0(2)is compatible to run on inline mode.
Regards,
Viraj

Good day,
Hi, You need minimum sup-bootdisk:s3223-advipservicesk9_wan-mz.122-18.SXF7.bin IOS to enable INLINE mode on 6500 series.
as per my knowledge,
the latest IOS is
sup-bootdisk:s3223-adventerprisek9_wan-mz.122-18.SXF13.bin.
for IDSM-2, if u upgrade to Engine 2 IOS, U can get update with E2 signatures and also U can manage from New Management Console like Cisco IPS manager Express 6.1.
I hope this will satisfy.

Similar Messages

  • CS5.5 Air for iOs - Which iOs versions are supported?

    Hi everyone,
    I wanted to test the functionalities of the Cs5.5 exporter for iOS, by exporting a previous Flash game i made on my 2G iPod, with 4.2.1 iOs version installed.
    Since i wouldn't want to pay for the iOS developer certificate just for trying, can anyone point out a solution for this?
    Moreover, is anyone sure it's gonna work? I wouldn't wanna spend good money just for seeing the Flash exporter is no good for my device.
    Suggestions?
    Anyone tried on similar OS?
    Thanks a lot
    Iacopo

    Ok, i managed to use a fake certificate (i know i shouldn't say that) just to check the feasability of a game on iOS and.... I found out that the exporter doesn't work on my iPod Touch 2G (iOs 4.2.1)!! It says the iPod is not supported!!
    Any news on this?
    Do i need to buy an iPhone 5 to test flash games? It sounds a little extreme....

  • Cisco IOS Version to Support SIP Trunking on AS5400 Routers

    Hi all,
    Kindly help .Can anyone tell me which Cisco IOS Version Supports SIP Trunking on AS5400 Routers ?
    Regards,
    Cliff .

    Hi,
    Please look at:
    http://www.cisco.com/en/US/products/hw/univgate/ps505/products_data_sheet09186a0080091e51.html
    http://www.cisco.com/en/US/docs/routers/access/as5350/software/feature/guide/UPfeapu.html
    HTH
    Jorge Armijo
    Please remember to rate helpful responses and identify helpful or correct answers.

  • Router platform and IOS version to support MPLS

    I have few Cisco 2621 routers and one 3640 router, could I use these router to create a MPLS VPN lab? if so , what is the minimum IOS version required?
    Thanks in advance.

    The minimum hardware and software image tu support MPLS can be found at www.cisco.com/go/fn select search by feature and in the search box put MPLS (Multiprotocol Label Switching) there you can find the platform and IOS to support basic MPLS, but you need to consider the fact that supporting MPLS special features like AToM can only be supported on some 7200, 7500, 7600, 10000 and 12000, http://www.cisco.com/en/US/products/sw/iosswrel/ps1839/products_feature_guide_chapter09186a0080153e64.html#1030652

  • Minimum IOS version to support scp URLs

    While recent IOS versions support scp sources or destinations for copy
    operations ...
       aprompt#copy running-config ?
         flash1:         Copy to flash1: file system
         flash2:         Copy to flash2: file system
         flash:          Copy to flash: file system
         ftp:            Copy to ftp: file system
         http:           Copy to http: file system
         https:          Copy to https: file system
         null:           Copy to null: file system
         nvram:          Copy to nvram: file system
         rcp:            Copy to rcp: file system
         running-config  Update (merge with) current system configuration
         scp:            Copy to scp: file system
         startup-config  Copy to startup configuration
         system:         Copy to system: file system
         tftp:           Copy to tftp: file system
         tmpsys:         Copy to tmpsys: file system
       aprompt#copy running-config
    ... older ones obviously don't (here we have 12.1):
       aprompt#copy running-config ?
         bs:             Copy to bs: file system
         flash:          Copy to flash: file system
         ftp:            Copy to ftp: file system
         null:           Copy to null: file system
         nvram:          Copy to nvram: file system
         rcp:            Copy to rcp: file system
         running-config  Update (merge with) current system configuration
         startup-config  Copy to startup configuration
         system:         Copy to system: file system
         tftp:           Copy to tftp: file system
         xmodem:         Copy to xmodem: file system
         ymodem:         Copy to ymodem: file system
         zflash:         Copy to zflash: file system
       aprompt#copy running-config
    Who could tell me the minumum version to support scp URLs?
    Thanks and Regards, Thomas

    Ideally any feature set questions are answerable in Cisco Feature Navigator (http://www.cisco.com/go/fn).
    The Secure Copy (SCP) feature provides a secure and authenticated method for copying router configuration or router image files. SCP relies on Secure Shell (SSH), an application and a protocol that provide a secure replacement for the Berkeley r-tools. So ideally you should be running crypto images (k9) which support SSH and hence SCP as well.
    But following are some details about SCP, which may be helpful :
    Feature Name
    Releases
    Feature Information
    Secure Copy
    12.2(2)T12.0(21)S
    12.2(25)S
    This feature was introduced in Cisco IOS Release 12.2(2)T.
    This feature was integrated into Cisco IOS Release 12.0(21)S.
    This feature was integrated into Cisco IOS Release 12.2(25)S.
    The following commands were introduced or modified: debug ip scp, ip scp server enable.
    Following is details Feature Information for Secure Shell Version 2 Support:
    Feature Name
    Releases
    Feature Information
    Secure Shell Version 2 Support
    12.2(11)T
    12.2(25)S
    12.3(4)T
    15.3(2)S
    The Secure Shell Version 2 Support feature allows you to configure Secure Shell (SSH) Version 2 (SSH Version 1 support was implemented in an earlier Cisco IOS software release). SSH runs on top of a reliable transport layer and provides strong authentication and encryption capabilities. SSH version 2 also supports AES counter-based encryption mode.
    The following commands were introduced or modified: debug ip ssh, ip ssh min dh size, ip ssh rsa keypair-name, ip ssh version, ssh.
    Secure Shell Version 2 Client and Server Support
    12.0(32)SY
    12.3(7)JA
    12.4(17)
    The Cisco IOS image was updated to provide for the automatic generation of SNMP traps when an SSH session terminates.
    SSH Keyboard Interactive Authentication
    12.2(33)SXH3
    12.4(18)
    The SSH Keyboard Interactive Authentication feature, also known as Generic Message Authentication for SSH, is a method that can be used to implement different types of authentication mechanisms. Basically, any currently supported authentication method that requires only user input can be performed with this feature.
    Secure Shell Version 2 Enhancements
    12.2(50)SY
    12.4(20)T
    15.1(2)S
    The Secure Shell Version 2 Enhancements feature includes a number of additional capabilities such as support for VRF-aware SSH, SSH debug enhancements, and DH Group 14 and Group 16 exchange support.
    In Cisco IOS 15.1(2)S, support was added for the Cisco 7600 series router.
    Note   
    Only the VRF-aware SSH feature is supported in Cisco IOS Release 12.2(50)SY.
    The following commands were introduced or modified: debug ip ssh, ip ssh dh min size.
    Secure Shell Version 2 Enhancements for RSA Keys.
    15.0(1)M
    15.1(1)S
    The Secure Shell Version 2 Enhancements for RSA Keys feature includes a number of additional capabilities to support RSA key-based user authentication for SSH and SSH server host key storage and verification.
    The following commands were introduced or modified: ip ssh pubkey-chain, ip ssh stricthostkeycheck.
    -Thanks
    Vinod
    **Encourage Contributors. RATE Them.**

  • L2 netflow in 6500 IOS version 15S

    We configured netflow at a 6509E with version 12.2.
    mls aging long 120
    mls aging normal 60
    mls netflow interface
    mls flow ip interface-full
    mls nde sender version 5
    ip flow-export source vlan1
    ip flow ingress layer2-switched vlan xxx-yyy
    ip flow-export destination 10.1.1.1 20
    and we added some "ip flow ingress" at selected interfaces.
    interface Vlanxx1
     ip flow ingress
    it works as expected
    Now we need to configure it at 6509E with version 15
    It is ok to configure the interfaces with flow monitor and exporter, but I didn´t find the layer2 netflow command.
    I used http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fnetflow/configuration/15-sy/fnf-15-sy-book.pdf to configure the netflow monitoring.
    Does anyone know about l2 netflow at IOS version 15?
    Thanks.
    Igor Max

    Looks to me like a timer problem - maybe a ARP timer on the clients? Check the ARP tables of your clients during your tests.
    HTH

  • IOS version that support 2048 bits certificate

    Hello,
    I need to update a 2504  Wireless Controller to a version that supports 2048 bits certificates.
    I´m checking release notes for release 7.4.110.0 and I don´t see any information about a limitation in certification size (2048 bytes in my case).
    Do you know any restriction about the certificate size in this or another version?
    Thanks and Regards.
    Iván.

    2048 bit is supported on the WLC. I use it for WebAuth and 3rd party certificates as these vendors only issue 2048 these days.
    Sent from Cisco Technical Support iPhone App

  • IDSM-2 Inline mode

    Hi,
    I am working with the IDSM-2, We have Cisco 6509 with CSM & FWSM, We are planning IDSM-2 in Inline mode and now i want to monitor the traffic which is coming through Outside Interface of the FW context ( Which is nothing but a VLAN A, VLAN B, Vlan C. on MSFC )
    Data flow :-- ISP RTR---INternal RTR---FWSM---IDSM---MSFC---CSM---
    IDSM version is 5.1(4)S257.0,
    This will support only Two VLAN (IN and OUT) on access mode.
    My problem is I don't know how to scan the traffic of 3 numbers of VLAN (A,B,C).
    Cisco 6509 --- Version 12.2(18)SXF7,

    Hi Udaya,
    I am not able to find out any subinterface.
    I think it is available from IPS 5.1 and this one is IPS5.0(2)
    IDSM2CORE2(config-int)# show settin
    physical-interfaces (min: 0, max: 999999999, current: 3)
    name: GigabitEthernet0/2
    media-type: backplane
    description:
    admin-state: enabled
    duplex: auto
    speed: auto
    alt-tcp-reset-interface
    none
    name: GigabitEthernet0/7
    media-type: backplane
    description:
    admin-state: enabled
    duplex: auto
    speed: auto
    alt-tcp-reset-interface
    interface-name: System0/1
    name: GigabitEthernet0/8
    media-type: backplane
    description:
    admin-state: enabled
    duplex: auto
    speed: auto
    alt-tcp-reset-interface
    interface-name: System0/1
    command-control: GigabitEthernet0/2
    inline-interfaces (min: 0, max: 999999999, current: 0)
    bypass-mode: auto
    interface-notifications
    missed-percentage-threshold: 0 percent
    notification-interval: 30 seconds
    idle-interface-delay: 30 seconds

  • IDSM-2 Inline mode operation - cat6000 Hybrid

    Hello, is the inline mode operation on the IDSM-2 IPS 5.1 only supported with catos 8.4(1)?
    Thanks!

    I agree, the IPS 5.1 release notes http://www.cisco.com/en/US/customer/products/hw/vpndevc/ps4077/prod_release_note09186a0080574954.html#wp1068104 says it requires 8.5(1) go figure.

  • Idsm 2- Inline Mode Deployment

    I would like to configure an IDSM-2 in inline mode, I am having trouble about the deployment, I have a couple of questions;
    1. If you configure 2 VLANs (existing) as VLAN pairs does this mean the exist connection between the 2 VLANs is broken?
    ie they can only communicate to each other via IPS.
    2. Where is the best place to deploy this type of IPS?

    In an inline VLAN-pair scenario, the IDSM2 will bridge the VLANs together using VLAN tag swapping.  Below is a quick topo sketch of an inline design where this might be used.
    6500 MSFC--VL10--(inside) FWSM (outside)--VLAN 11--IDSM--VLAN 111--RTR--INTERNET
    In the example above, the FWSM outside and RTR inside interfaces sit on the same Layer 3 subnet but different Layer 2 VLANs.  The IDSM is positioned inline using an inline VLAN-pair.  Traffic leaving the FWSM towards the Internet will go into the trunk to the IDSM on VLAN 11.  The IDSM will then swap the VLAN tag to 111 before fowarding the packet down the trunk.  This process allows the traffic to be influenced into the IDSM for inspection.
    http://www.cisco.com/en/US/customer/docs/security/ips/7.0/configuration/guide/cli/cli_interfaces.html#wp1047718

  • Which iOs version is supported?

    Hi
    I'm just wondering which version of iOs is supported by the 4.5SDK?
    Regards,
    Lars

    i think it comes out in June right now it is Android only someone correct me if i am wrong !

  • TS1702 i have iphone 3g . i m using ios 4.2.1 . i want to install viber , skype, facebook and an english dictionary. i downloaded it but at the end it says that my ios version doesnot support the application. so how do i get these apps. please help

    how do i get dictionary application in my iphone 3g running in 4.2.1 ios. and i want skype and viber and facebook as well. could anyone help

    Since the iPhone 3G will only run iOS up to 4.2.1, if these apps require a higher iOS level, there is nothing that you can do.
    There should be some dictionary apps in the App store that will run on iOS 4.2.1.

  • IDSM2 on 6500-IOS inline mode support?

    Hi,
    I have an IDSM-2 running IPS5.1(1d) software (recently upgraded from 4.x) that is sitting on a 6500 IOS.
    The IPS device manager shows gi0/7 and gi0/8 as both in Promiscuous mode. There is no option to change the mode to inline and pair them.
    Is it so that IDSM-2 currently supports only Promiscuous mode?
    If so, then this module is still acting as an IDS despite running IPS5.1. Isn't it? What is the advantage that I get after upgrading it from 4.x to 5.1?
    -- Vasanth

    There are 2 pieces to the puzzle.
    There is the IDSM-2 version and what it supports, but also the Cat 6K Native IOS version and what it supports.
    IDSM-2 v5.1(1d) supports
    a) Promiscuous mode,
    b) InLine Interface Pair mode (2 interfaces are paired for inline monitoring), and also
    c) InLine Vlan Pair mode (2 vlans on a single interface are paired for inline monitoring, you will also see it called inline-on-a-stick)
    But for these features to be used, the switch code must also support configuring the switch side of the IDSM-2 for each of these 3 features.
    Native IOS Versions prior to 12.2(18)SXE will support only Promiscuous mode on the IDSM-2.
    12.2(18)SXE and later versions will support InLine Interface Pair mode on the IDSM-2.
    No Native IOS versions currently support InLine Vlan Pair mode on the IDSM-2 (a new Native IOS versions with this support is currently in development).
    So to get Inline (IPS) functionality you need to be running a Native IOS version 12.2(18)SXE or later, and on the IDSM-2 run IPS versions 5.1 (or even the older 5.0).
    (NOTE: Cat OS 8.5(1) does support all 3 modes of the IDSM-2. So if you are using Cat OS instead of Native IOS, then run version 8.5(1) to have access to all of the features of IPS 5.1(1) on the IDSM-2)
    If you are running a Native IOS version prior to 12.2(18)SXE then the IDSM-2 can only be operated in Promiscuous mode even if 5.1(1) is loaded on the IDSM-2.
    However, even in promiscuous mode the IPS 5.1(1) software does have a few advantages.
    There are several engines, and engine parameters that are only supported in the 5.1 version and not the 4.0 version. So there are several signatures that are either a) not even created for 4.x sensors, or b) the 4.x signature is not as precise as the 5.x signature in the new engines.
    (These new engines have proved invaluable in writing signatures to detect some of the new attacks that have come out over the past year.)
    There are of course other advantages as well:
    For example:
    1) Risk Rating to better aid in prioritization of alerts.
    2) More flexible fitlering mechanism for alerts that allows for fitlering individual actions
    The 2 features above are just 2 of the new features that have been added in 5.0 and 5.1 that apply to both promiscuous and inline modes.

  • IOS versions

    Hi All,
    I need to find an iOS version that supports BGP, Dot1q, and MPLS for either a 1800 series or 1900 series not sure the best place to find this sort of info out.
    Sorry if this post is in the wrong section.
    Many Thanks
    Lee
    Sent from Cisco Technical Support iPad App

    Go here:  http://www.cisco.com/go/fn

  • How can i use IDSM-2 in inline mode for more than two VLANs?

    can i use the IDSM-2 in inline mode to be ips to more than two VLANS
    like this or it isn't
    intrusion-detection module 5 data port 1 access-vlan 10,20,30,40,50
    intrusion-detection module 5 data port 1 access-vlan 100,200
    thank u all for your help

    The IDSM-2 ports need to be configured as trunk ports with multiple vlans rather than as access ports.
    http://www.cisco.com/en/US/partner/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a00807517eb.html#wp1068377
    And instead of creating an inline interface pair by pairing Gig0/7 with Gig0/8 within the IDSM-2 configuration, you would create inline vlan pairs.
    With an inline vlan pair you pair 2 vlans on the same interface.
    You can have up to 255 inline vlan pairs on each interface (assumining you keep the total traffic from all of the pairs within the IDSM-2s performance limit of around 500Mbps)
    How to create inline vlan pairs:
    http://www.cisco.com/en/US/partner/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a00807517bb.html#wp1047852
    The other aspect you need to be aware of is that not all IOS versions will support configuring the IDSM-2 data ports as trunk ports for inline vlan pairs.
    Your best bet is to use 12.2(18)SXF4 or a later version on the 12.2(18)SXF train.
    The 12.2(33)SR train does not currently support the trunk feature for the IDSM-2.

Maybe you are looking for

  • N95-1 fw 31.0.017...funny bug!!!

    SInce fw update to version 31, I have a nice bug...each time I close slider photo button e gallery button (on right side) flash for two times alternatively...this is a bug but it's funny...let me know if also you have this flashing K + C = 1

  • Just updated Tiger now my KVM wont work!!!

    I just ran the most recent update for tiger, now my Belkin KVM switch doesn't work, it did before the update, now when I switch on my G4 (g4 400 os9.2.2) it tries to cut in I can even force the monitor over but it goes right back to my mac min (G4 1.

  • Track pad is not working

    Can somebody suggest a way to fix this problem?

  • How to read a non-oracle environment variable?

    I have been trying to read a non-oracle environment variable using TOOL_ENV.GETVAR, and have come to understand that it doesn't work. Is there another function that can do what I want? I don't want to hardcode the directory the forms and reports must

  • Audio bug with WAV files: use mp3, not wav for syncing long audio files

    Just a tip: I've noticed another audio bug in Presenter (including 7.05) but there is a workaround. I often export the audio as a single, long clip from pre-recorded lecture videos, and sync it with the powerpoint slides in Presenter. I've found it e