Cisco IPS-4255-K9 - Intrusion Protection Sys 4255 Installation Manual page 213

Intrusion prevention system appliance and module installation guide for ips 7.0
Table of Contents

Advertisement

Chapter 10
Initializing the Sensor
Signature Definitions: sig0
Promiscuous Vlan Groups:
GigabitEthernet0/8:10
GigabitEthernet0/8:9
[1] Remove vs
[2] Modify "vs0"
[3] Create new vs
Option:
Press Enter to return to the top-level interface and virtual sensor configuration menu.
Step 16
[1] Edit Interface Configuration
[2] Edit Virtual Sensor Configuration
[3] Display configuration
Option:
Step 17
Press Enter to exit the interface and virtual sensor configuration menu.
Step 18
Enter
Note
Virtual sensor vs0 is configured to prevent high risk threats in inline mode.(Risk Rating
90-100)
Do you want to disable automatic threat prevention on all virtual sensors?[no]:
Step 19
Enter
The following configuration was entered.
service host
network-settings
host-ip 10.1.9.201/24,10.1.9.1
host-name IDSM2
telnet-option disabled
ftp-timeout 300
no login-banner-text
exit
time-zone-settings
offset 0
standard-time-zone-name UTC
exit
summertime-option disabled
ntp-option disabled
exit
service web-server
port 342
exit
service interface
physical-interfaces GigabitEthernet0/8
admin-state enabled
subinterface-type vlan-group
subinterface 9
description Created via setup by user asmith
vlans range 1-100
exit
subinterface 10
description Created via setup by user asmith
vlans unassigned
exit
exit
OL-18504-01
(Vlans: unassigned)
(Vlans: 1-100)
if you want to modify the default threat prevention settings.
yes
The sensor comes with a built-in override to add the deny packet event action to high risk rating
alerts. If you do not want this protection, disable automatic threat prevention.
to disable automatic threat prevention on all virtual sensors.
yes
Cisco Intrusion Prevention System Appliance and Module Installation Guide for IPS 7.0
Advanced Setup
10-23

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents