Cisco Cisco IPS 4345 Sensor
40
Release Notes for Cisco Intrusion Prevention System 7.2(1)E4
OL-27710-01
Initializing the Sensor
exit
virtual-sensor vs0
physical-interface GigabitEthernet0/0 subinterface-number 1
logical-interface newPair
service event-action-rules rules0
overrides deny-packet-inline
override-item-status Disabled
risk-rating-range 90-100
exit
exit
[0] Go to the command prompt without saving this config.
[1] Return back to the setup without saving this config.
[2] Save this configuration and exit setup.
Step 28
Enter
2
to save the configuration.
Enter your selection[2]: 2
Configuration Saved.
Step 29
Reboot the appliance.
sensor# reset
Warning: Executing this command will stop all applications and reboot the node.
Continue with reset? []:
Step 30
Enter
yes
to continue the reboot.
Step 31
Apply the most recent service pack and signature update. You are now ready to configure your appliance
for intrusion prevention.
for intrusion prevention.
Advanced Setup for the ASA 5500-X IPS SSP
To continue with advanced setup for the ASA 5500-X IPS SSP, follow these steps:
Step 1
Session in to the IPS using an account with administrator privileges.
asa# session ips
Step 2
Enter the
setup
command. The System Configuration Dialog is displayed. Press Enter or the spacebar
to skip to the menu to access advanced setup.
Step 3
Enter
3
to access advanced setup.
Step 4
Specify the Telnet server status. You can disable or enable Telnet services. The default is disabled.
Step 5
Specify the SSHv1 fallback setting. The default is disabled.
Step 6
Specify the web server port. The web server port is the TCP port used by the web server (1 to 65535).
The default is 443.
The default is 443.
Note
If you change the web server port, you must specify the port in the URL address of your browser
when you connect to the IDM. Use the following format:
when you connect to the IDM. Use the following format:
https://ips_ssp_ip_address:port
(for example,
https://10.1.9.201:1040
).