The Cisco Automated IOS® Protection capability uses a group of traffic filters that are updated as needed to protect the router against new exploits and vulnerabilities. These filters can be applied to protect the Cisco IOS Software control plane and (if desired) to filter traffic going through one or more interfaces on the router.
Configuration for Automatic Download
The Cisco Automated IOS Protection capability can be configured to automatically download protection (filter) packages from a central server maintained on the customer premises or directly from Cisco.com (if the router has access to the Internet) at desired intervals using one of the supported protocols and providing a username and password if necessary.
Follow the steps shown here to configure periodic updates of Cisco Automated IOS Protection capability filter packages from a local or central server.
Note that "fpm" refers to the Flexible Packet Matching technology used by the Cisco Automated IOS Protection capability. Note also that "AIP" refers to the Cisco Automated IOS Protection Solution.
Configure a time range to periodically check for new updates of Cisco Automated IOS Protection Solution filter packages:
Router(config)# time-range AIPTimer
Router(config-time-range)# periodic daily 23:30 to 23:59
Here is another example of time range configuration:
Router(config)# time-range AIPTimer
Router(config-time-range)# periodic Sunday 5:00 to 6:00
Configure parameters for the remote or central server, username, password, etc. and associate the package information with the time range configured in step 1. Use the following sample configuration:
Router(config-fpm-pak-info)# host ftp.cisco.com
Router(config-fpm-pak-info)# username Amy
Router(config-fpm-pak-info)# password xxxxxxx
Router(config-fpm-pak-info)# local-path flash:
! one may use any other user-created local directory on the router
Note that the username and password are not required if TFTP is used. For servers supporting non-authentication-based HTTP, you can use any dummy username and password. Other supported protocols are HTTPS, FTP, and SCP.
Configure the Cisco Automated IOS Protection Solution filter package group to include the Cisco Automated IOS Protection Solution filter package that will be posted by Cisco with traffic filters for new vulnerabilities as needed. Although you can add other traffic filter packages to this filter package group, they are not needed for or relevant to the operation of the Cisco Automated IOS Protection Solution. Hence, this filter package group is created to contain only the Cisco Automated IOS Protection Solution filter package. If the traffic being monitored matches any of the filters in the package provided, it will be dropped and an event log will be generated.
Apply the Cisco Automated IOS Protection Solution filter package group to the control plane internal interface to protect the router (as shown here) and (if desired) any combination of the physical (external) interfaces to monitor the traffic going through them in the inbound and outbound directions.
(Optional) Manual Filter Package Download Using Executive Mode Command-Line Interface on the Router
Cisco Automated IOS Protection Solution filter package updates (downloads) can be also invoked immediately through the Cisco IOS Software executive mode command line.
Note that the timer range configuration (step 1) can be omitted if filter downloads will be executed only manually as shown in the following example. All other steps shown in the preceding section are still required before you run the following command to immediately download the protection filter package to the router.
router#fpm package-update server
The preceding command will download the filter package based on the parameter settings in steps 2 to 4 in the configuration shown earlier. This command is especially useful to run as a script on multiple routers in service provider and medium-sized and large enterprise deployments in which the package updates are downloaded manually from Cisco to a central server.