Cisco Cisco IPS 4520 Sensor 릴리즈 노트

다운로드
페이지 74
   
50
Release Notes for Cisco Intrusion Prevention System 7.1(7)E4
OL-27710-01
  Initializing the Sensor
logical-interface newPair 
service event-action-rules rules0
overrides deny-packet-inline
override-item-status Disabled
risk-rating-range 90-100
exit
exit
[0] Go to the command prompt without saving this config.
[1] Return back to the setup without saving this config.
[2] Save this configuration and exit setup.
Step 27
Enter 
2
 to save the configuration.
Enter your selection[2]: 2 
Configuration Saved.
Step 28
Reboot the appliance.
sensor# reset
Warning: Executing this command will stop all applications and reboot the node.
Continue with reset? []:
Step 29
Enter 
yes
 to continue the reboot.
Step 30
Apply the most recent service pack and signature update. You are now ready to configure your appliance 
for intrusion prevention.
Advanced Setup for the ASA 5500 AIP SSM
To continue with advanced setup for the ASA 5500 AIP SSM, follow these steps:
Step 1
Session in to the ASA 5500 AIP SSM using an account with administrator privileges.
asa# session 1
Step 2
Enter the 
setup
 command. The System Configuration Dialog is displayed. Press Enter or the spacebar 
to skip to the menu to access advanced setup.
Step 3
Enter 
to access advanced setup. 
Step 4
Specify the Telnet server status. You can disable or enable Telnet services. The default is disabled.
Step 5
Specify the web server port. The web server port is the TCP port used by the web server (1 to 65535). 
The default is 443. 
Note
The web server is configured to use TLS/SSL encryption by default. Setting the port to 80 does 
not disable the encryption.
Step 6
Enter 
yes
 to modify the interface and virtual sensor configuration.
Current interface configuration
 Command control: Management0/0
 Unassigned:
  Monitored:
   GigabitEthernet0/1
 
 Virtual Sensor: vs0