Cisco Cisco IPS 4345 Sensor

Seite von 56
   
48
Release Notes for Cisco Intrusion Prevention System 7.2(1)E4
OL-27710-01
  Initializing the Sensor
Step 27
Write down the certificate fingerprints. You need the fingerprints to check the authenticity of the 
certificate when using HTTPS to connect to this ASA 5585-X IPS SSP with a web browser.
Step 28
Apply the most recent service pack and signature update. You are now ready to configure your 
ASA 5585-X IPS SSP for intrusion prevention.
Verifying Initialization
Note
The following show configuration output is an example of what your configuration may look like. It 
will not match exactly because of the optional setup choices. 
To verify that you initialized your sensor, follow these steps:
Step 1
Log in to the sensor. 
Step 2
View your configuration.
sensor# show configuration
! ------------------------------
! Current configuration last modified Fri Apr 19 19:01:05 2013
! ------------------------------
! Version 7.2(1)
! Host:
!     Realm Keys          key1.0
! Signature Definition:
!     Signature Update    S697.0   2013-02-15
! ------------------------------
service interface
physical-interfaces GigabitEthernet0/0
admin-state enabled
exit
physical-interfaces GigabitEthernet0/1
admin-state enabled
exit
inline-interfaces pair0
interface1 GigabitEthernet0/0
interface2 GigabitEthernet0/1
exit
bypass-mode auto
exit
! ------------------------------
service authentication
exit
! ------------------------------
service event-action-rules rules0
exit
! ------------------------------
service host
network-settings
host-ip 10.106.133.159/23,10.106.132.1
host-name q4360-159
telnet-option enabled
access-list 0.0.0.0/0
dns-primary-server disabled
dns-secondary-server disabled
dns-tertiary-server disabled