Sensor Configuration Task Flow - Cisco 4215 - Intrusion Detection Sys Sensor Configuration Manual

Configuration guide
Hide thumbs Also See for 4215 - Intrusion Detection Sys Sensor:
Table of Contents

Advertisement

Sensor Configuration Task Flow

Sensor Configuration Task Flow
Perform the following tasks to configure the sensor:
1.
2.
3.
4.
You should carefully consider whether you want to create a service account. The service account
Caution
provides shell access to the system, which makes the system vulnerable. However, you can use the
service account to create a new password if the Administrator password is lost. Analyze your situation
to decide if you want a service account existing on the system.
5.
6.
7.
8.
9.
10.
11.
12.
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 5.0
1-2
Log in to the sensor.
For the procedure, see
Chapter 2, "Logging In to the Sensor."
Initialize the sensor.
Run the setup command to initialize the sensor.
For the procedure, see
Chapter 3, "Initializing the Sensor."
Verify the sensor initialization.
For the procedure, see
Verifying Initialization, page
Create the service account.
A service account is needed for password recovery and other special debug situations directed by
TAC.
For the procedure, see
Creating the Service Account, page
License the sensor.
For the procedure, see
Obtaining a License Key From Cisco.com, page
Perform the other initial tasks, such as adding users and trusted hosts and so forth.
For the procedures, see
Chapter 4, "Initial Configuration Tasks."
Make changes to the interface configuration if necessary.
For the procedures, see
Chapter 5, "Configuring Interfaces."
You configure the interfaces during initialization.
Note
Configure event action rules.
For the procedures, see
Chapter 6, "Configuring Event Action Rules."
Configure the signatures for intrusion prevention.
For the procedures, see
Chapter 7, "Defining Signatures."
Configuring IP Logging.
For the procedures, see
Chapter 8, "Configuring IP Logging."
Configure blocking.
For the procedures, see
Chapter 10, "Configuring Blocking."
Configure SNMP if you are going to use it.
For the procedures, see
Chapter 11, "Configuring SNMP."
Chapter 1
Introducing the CLI Configuration Guide
3-7.
4-13.
18-6.
78-16527-01

Advertisement

Table of Contents
loading

Table of Contents