Ip audit signature list – Cisco ASA 5505 User Manual
Page 1210
57-4
Cisco ASA 5500 Series Configuration Guide using the CLI
Chapter 57 Using Protection Tools
Configuring IP Audit for Basic IPS Support
IP Audit Signature List
lists supported signatures and system message numbers.
Table 57-1
Signature IDs and System Message Numbers
Signature
ID
Message
Number
Signature Title
Signature Type Description
1000
400000
IP options-Bad Option List
Informational
Triggers on receipt of an IP datagram where
the list of IP options in the IP datagram header
is incomplete or malformed. The IP options
list contains one or more options that perform
various network management or debugging
tasks.
1001
400001
IP options-Record Packet Route
Informational
Triggers on receipt of an IP datagram where
the IP option list for the datagram includes
option 7 (Record Packet Route).
1002
400002
IP options-Timestamp
Informational
Triggers on receipt of an IP datagram where
the IP option list for the datagram includes
option 4 (Timestamp).
1003
400003
IP options-Security
Informational
Triggers on receipt of an IP datagram where
the IP option list for the datagram includes
option 2 (Security options).
1004
400004
IP options-Loose Source Route
Informational
Triggers on receipt of an IP datagram where
the IP option list for the datagram includes
option 3 (Loose Source Route).
1005
400005
IP options-SATNET ID
Informational
Triggers on receipt of an IP datagram where
the IP option list for the datagram includes
option 8 (SATNET stream identifier).
1006
400006
IP options-Strict Source Route
Informational
Triggers on receipt of an IP datagram in
which the IP option list for the datagram
includes option 2 (Strict Source Routing).
1100
400007
IP Fragment Attack
Attack
Triggers when any IP datagram is received
with an offset value less than 5 but greater
than 0 indicated in the offset field.
1102
400008
IP Impossible Packet
Attack
Triggers when an IP packet arrives with
source equal to destination address. This
signature will catch the so-called Land
Attack.