Cisco Cisco IPS 4255 Sensor
38
Release Notes for Cisco Intrusion Prevention System 7.3(5)E4
OL-32050-01
Initializing the Sensor
signature-definition newSig
event-action-rules rules0
anomaly-detection
anomaly-detection-name ad0
operational-mode inactive
exit
physical-interface GigabitEthernet0/0
exit
virtual-sensor vs0
physical-interface GigabitEthernet0/0 subinterface-number 1
logical-interface newPair
service event-action-rules rules0
overrides deny-packet-inline
override-item-status Disabled
risk-rating-range 90-100
exit
exit
[0] Go to the command prompt without saving this config.
[1] Return back to the setup without saving this config.
[2] Save this configuration and exit setup.
Step 28
Enter
2
to save the configuration.
Enter your selection[2]: 2
Configuration Saved.
Step 29
Reboot the appliance.
sensor# reset
Warning: Executing this command will stop all applications and reboot the node.
Continue with reset? []:
Step 30
Enter
yes
to continue the reboot.
Step 31
Apply the most recent service pack and signature update. You are now ready to configure your appliance
for intrusion prevention.
for intrusion prevention.
Advanced Setup for the ASA 5500-X IPS SSP
To continue with advanced setup for the ASA 5500-X IPS SSP, follow these steps:
Step 1
Session in to the IPS using an account with administrator privileges.
asa# session ips
Step 2
Enter the
setup
command. The System Configuration Dialog is displayed. Press Enter or the spacebar
to skip to the menu to access advanced setup.
Step 3
Enter
3
to access advanced setup.
Step 4
Specify the Telnet server status. You can disable or enable Telnet services. The default is disabled.
Step 5
Specify the SSHv1 fallback setting. The default is disabled.
Step 6
Specify the web server port. The web server port is the TCP port used by the web server (1 to 65535).
The default is 443.
The default is 443.