Cisco Cisco IPS 4255 Sensor

Pagina di 56
   
38
Release Notes for Cisco Intrusion Prevention System 7.3(5)E4
OL-32050-01
  Initializing the Sensor
signature-definition newSig
event-action-rules rules0
anomaly-detection
anomaly-detection-name ad0
operational-mode inactive
exit
physical-interface GigabitEthernet0/0 
exit
virtual-sensor vs0 
physical-interface GigabitEthernet0/0 subinterface-number 1 
logical-interface newPair 
service event-action-rules rules0
overrides deny-packet-inline
override-item-status Disabled
risk-rating-range 90-100
exit
exit
[0] Go to the command prompt without saving this config.
[1] Return back to the setup without saving this config.
[2] Save this configuration and exit setup.
Step 28
Enter 
2
 to save the configuration.
Enter your selection[2]: 2 
Configuration Saved.
Step 29
Reboot the appliance.
sensor# reset
Warning: Executing this command will stop all applications and reboot the node.
Continue with reset? []:
Step 30
Enter 
yes
 to continue the reboot.
Step 31
Apply the most recent service pack and signature update. You are now ready to configure your appliance 
for intrusion prevention.
Advanced Setup for the ASA 5500-X IPS SSP
To continue with advanced setup for the ASA 5500-X IPS SSP, follow these steps:
Step 1
Session in to the IPS using an account with administrator privileges.
asa# session ips
Step 2
Enter the 
setup
 command. The System Configuration Dialog is displayed. Press Enter or the spacebar 
to skip to the menu to access advanced setup.
Step 3
Enter 
to access advanced setup. 
Step 4
Specify the Telnet server status. You can disable or enable Telnet services. The default is disabled.
Step 5
Specify the SSHv1 fallback setting. The default is disabled.
Step 6
Specify the web server port. The web server port is the TCP port used by the web server (1 to 65535). 
The default is 443.