Cisco Cisco IPS 4345 Sensor

Pagina di 56
   
40
Release Notes for Cisco Intrusion Prevention System 7.2(1)E4
OL-27710-01
  Initializing the Sensor
exit
virtual-sensor vs0 
physical-interface GigabitEthernet0/0 subinterface-number 1 
logical-interface newPair 
service event-action-rules rules0
overrides deny-packet-inline
override-item-status Disabled
risk-rating-range 90-100
exit
exit
[0] Go to the command prompt without saving this config.
[1] Return back to the setup without saving this config.
[2] Save this configuration and exit setup.
Step 28
Enter 
2
 to save the configuration.
Enter your selection[2]: 2 
Configuration Saved.
Step 29
Reboot the appliance.
sensor# reset
Warning: Executing this command will stop all applications and reboot the node.
Continue with reset? []:
Step 30
Enter 
yes
 to continue the reboot.
Step 31
Apply the most recent service pack and signature update. You are now ready to configure your appliance 
for intrusion prevention.
Advanced Setup for the ASA 5500-X IPS SSP
To continue with advanced setup for the ASA 5500-X IPS SSP, follow these steps:
Step 1
Session in to the IPS using an account with administrator privileges.
asa# session ips
Step 2
Enter the 
setup
 command. The System Configuration Dialog is displayed. Press Enter or the spacebar 
to skip to the menu to access advanced setup.
Step 3
Enter 
to access advanced setup. 
Step 4
Specify the Telnet server status. You can disable or enable Telnet services. The default is disabled.
Step 5
Specify the SSHv1 fallback setting. The default is disabled.
Step 6
Specify the web server port. The web server port is the TCP port used by the web server (1 to 65535). 
The default is 443. 
Note
If you change the web server port, you must specify the port in the URL address of your browser 
when you connect to the IDM. Use the following format: 
https://ips_ssp_ip_address:port
 
(for example, 
https://10.1.9.201:1040
).