Cisco Cisco IPS 4520 Sensor
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
61
Release Notes for Cisco Intrusion Prevention System 7.1(7)E4
OL-27710-01
Initializing the Sensor
Step 23
Reboot the ASA 5585-X IPS SSP.
ips-ssp# reset
Warning: Executing this command will stop all applications and reboot the node.
Continue with reset? []:
Step 24
Enter
yes
to continue the reboot.
Step 25
After reboot, log in to the sensor, and display the self-signed X.509 certificate (needed by TLS).
ips-ssp# show tls fingerprint
MD5: C4:BC:F2:92:C2:E2:4D:EB:92:0F:E4:86:53:6A:C6:01
SHA1: 64:9B:AC:DE:21:62:0C:D3:57:2E:9B:E5:3D:04:8F:A7:FD:CD:6F:27
Step 26
Write down the certificate fingerprints. You need the fingerprints to check the authenticity of the
certificate when using HTTPS to connect to this ASA 5585-X IPS SSP with a web browser.
certificate when using HTTPS to connect to this ASA 5585-X IPS SSP with a web browser.
Step 27
Apply the most recent service pack and signature update. You are now ready to configure your
ASA 5585-X IPS SSP for intrusion prevention.
ASA 5585-X IPS SSP for intrusion prevention.
Verifying Initialization
Note
The following show configuration output is an example of what your configuration may look like. It
will not match exactly because of the optional setup choices.
will not match exactly because of the optional setup choices.
To verify that you initialized your sensor, follow these steps:
Step 1
Log in to the sensor.
Step 2
View your configuration.
sensor# show configuration
! ------------------------------
! Current configuration last modified Wed Feb 05 10:42:20 2013
! ------------------------------
! Version 7.1(7)
! Host:
! Realm Keys key1.0
! Signature Definition:
! Signature Update S648.0 2012-05-30
! ------------------------------
service interface
exit
! ------------------------------
service authentication
exit
! ------------------------------
service event-action-rules rules0
exit
! ------------------------------
service host
network-settings
host-ip 192.168.1.2/24, 192.168.1.1
host-name sensor
telnet-option enabled
access-list 0.0.0.0/0