Cisco 4215 - Intrusion Detection Sys Sensor manuals
4215 - Intrusion Detection Sys Sensor
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Overview
- Sensor Configuration Task Flow
- User Roles
- CLI Behavior
- Command Line Editing
- IPS Command Modes
- Regular Expression Syntax
- General CLI Commands
- Supported User Roles
- Logging In to the Appliance
- Setting Up a Terminal Server
- Logging In to IDSM-2
- Logging In to NM-CIDS
- Logging In to AIP-SSM
- Logging In to the Sensor
- Chapter 3 Initializing the Sensor
- Initializing the Sensor
- Verifying Initialization
- Changing Network Settings
- Changing the Hostname
- Changing the Access List
- Changing the FTP Timeout
- Adding a Login Banner
- Changing Web Server Settings
- Configuring User Parameters
- Password Recovery
- Configuring Passwords
- Changing User Privilege Levels
- Viewing User Status
- Configuring Account Locking
- Configuring Time
- Correcting Time on the Sensor
- Configuring Time on the Sensor
- Configuring Summertime Settings
- Configuring Timezones Settings
- About SSH
- Adding Hosts to the Known Hosts List
- Adding SSH Authorized Public Keys
- Generating a New SSH Server Key
- Adding TLS Trusted Hosts
- Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS
- Understanding Interfaces
- Interface Support
- Promiscuous Mode
- Inline Mode
- Understanding Bypass Mode
- Configuring Bypass Mode
- About Event Action Rules
- Signature Event Action Processor
- Event Actions
- About Event Action Variables
- Calculating the Risk Rating
- Configuring Target Value Ratings
- Configuring Event Action Overrides
- Event Action Filters
- Configuring Event Action Filters
- General Settings
- About General Settings
- Deny Attackers
- Clearing the Denied Attackers List
- Event Action Rules Example
- About Signatures
- Signature Variables
- Configuring Signatures
- Configuring General Signature Parameters
- Configuring Alert Frequency
- Configuring Alert Severity
- Configuring Event Counter
- Configuring Signature Fidelity Rating
- Configuring the Status of Signatures
- Assigning Actions to Signatures
- Configuring AIC Signatures
- Configuring the Application Policy
- AIC Request Method Signatures
- AIC MIME Define Content Type Signatures
- AIC Transfer Encoding Signatures
- AIC FTP Commands Signatures
- IP Fragment Reassembly
- Configuring the Mode for TCP Stream Reassembly
- Configuring IP Logging
- Creating Custom Signatures
- Example STRING.TCP Signature
- Example SERVICE.HTTP Signature
- Example MEG Signature
- Example AIC MIME-Type Signature
- About IP Logging
- Configuring Automatic IP Logging
- Configuring Manual IP Logging for a Specific IP Address Stopping Active IP Logs
- Copying IP Log Files to Be Viewed
- About Packet Display and Capture
- Displaying Live Traffic on an Interface
- Capturing Live Traffic on an Interface
- Copying the Packet File
- Erasing the Packet File
- Understanding Blocking
- Blocking Prerequisites
- Configuring Blocking Properties
- Disabling Blocking
- Setting Maximum Block Entries
- Setting the Block Time
- Enabling ACL Logging
- Enabling Writing to NVRAM
- Logging All Blocking Events and Errors
- Configuring User Profiles
- Configuring Blocking Devices
- Configuring the Sensor to Manage Cisco Routers
- Routers
- Configuring the Sensor to Manage Cisco Firewalls
- Configuring the Sensor to be a Master Blocking Sensor
- Configuring Manual Blocking
- Obtaining a List of Blocked Hosts and Connections
- About SNMP
- Configuring SNMP
- Configuring SNMP Traps
- Supported MIBS
- Displaying the Current Configuration
- Displaying the Current Submode Configuration
- Filtering the Current Configuration Output
- Filtering the Current Submode Configuration Output
- Displaying the Contents of a Logical File
- Creating a Banner Login
- Terminating CLI Sessions
- Modifying Terminal Properties
- Events
- Clearing Events from the Event Store
- Manually Setting the Clock
- Displaying Statistics
- Displaying Tech Support Information
- Displaying Version Information
- Directing Output to a Serial Connection
- Diagnosing Network Connectivity
- Resetting the Appliance
- Displaying Command History
- Tracing the Route of an IP Packet
- Displaying Submode Settings
- Chapter 14 Configuring AIP-SSM
- Configuration Sequence
- Verifying IDSM-2 Installation
- Catalyst Software
- Cisco IOS Software
- Configuring SPAN
- Configuring VACLS
- Configuring the mls ip ids Command
- Configuring EtherChanneling
- Disabling EtherChanneling
- Verifying EtherChanneling
- Administrative Tasks for IDSM-2
- Resetting IDSM-2
- Catalyst and Cisco IOS Software Commands
- Supported Supervisor Engine Commands
- Unsupported Supervisor Engine Commands
- EXEC Commands
- Configuration Commands
- Configuring IDS-Sensor Interfaces on the Router
- Establishing NM-CIDS Sessions
- Sessioning to NM-CIDS
- Telneting to NM-CIDS
- Supported Cisco IOS Commands
- Upgrading the Sensor
- Using the Upgrade Command
- Upgrading the Recovery Partition
- Configuring Automatic Upgrades
- Auto-upgrade Command and Options
- Using the auto-upgrade Command
- Downgrading the Sensor
- Recovering the Application Partition
- Installing System Images
- Installing the IDS-4215 System Image
- Upgrading the IDS-4215 BIOS and ROMMON
- Installing the NM-CIDS System Image
- Upgrading the Bootloader
- Installing the IDSM-2 System Image
- Configuring the Maintenance Partition
- Upgrading the Maintenance Partition
- Installing the AIP-SSM System Image
- IPS Software Image Naming Conventions
- x Software Release Examples
- Obtaining a License Key From Cisco.com
- Service Programs for IPS Products
- Installing the License Key
- Using the CLI
- Cisco Security Center
- Accessing IPS Documentation