Cisco Cisco IPS 4255 Sensor

Pagina di 12
   
9
Release Notes for Cisco Intrusion Prevention System Manager Express 7.1.1
OL-24340-01
  Recovering the IME Password
No single character repeated more than two times consecutively. 
All input must be ASCII characters.
Note
IME performs other checks to make sure that the password is secure. You receive an error message if the 
password does not pass validation.
Recovering the IME Password
To recover the IME password, follow these steps:
Step 1
Stop the IME client.
Step 2
Delete the hosts.cfg file from the installed directory. 
Example 
C:\Documents and Settings\All Users\Application Data\Cisco Systems\IME\iev\hosts.cfg
Step 3
Restart the IME client. 
Step 4
You are prompted to create a password.
No events are lost from the database, including new events between the time you deleted hosts.cfg and 
restarted IME. However, the event account user name and password will be used for both events and 
configuration. If you had different user names and passwords for the event and configuration roles, you 
must edit each device to restore them.
Cisco Security Intelligence Operations
The Cisco Security Intelligence Operations site on Cisco.com provides intelligence reports about current 
vulnerabilities and security threats. It also has reports on other security topics that help you protect your 
network and deploy your security systems to reduce organizational risk.
You should be aware of the most recent security threats so that you can most effectively secure and 
manage your network. Cisco Security Intelligence Operations contains the top ten intelligence reports 
listed by date, severity, urgency, and whether there is a new signature available to deal with the threat.
Cisco Security Intelligence Operations contains a Security News section that lists security articles of 
interest. There are related security tools and links.
You can access Cisco Security Intelligence Operations at this URL:
Cisco Security Intelligence Operations is also a repository of information for individual signatures, 
including signature ID, type, structure, and description.
You can search for security alerts and signatures at this URL: