Enabling Ssh Connections To The Network Device - Cisco 4215 - Intrusion Detection Sys Sensor Configuration Manual

Configuration guide
Hide thumbs Also See for 4215 - Intrusion Detection Sys Sensor:
Table of Contents

Advertisement

Troubleshooting the 4200 Series Appliance
To initiate a manual block to a bogus host, follow these steps:
Enter Network Access Controller general submode:
Step 1
sensor# configure terminal
sensor(config)# service network-access
sensor(config-net)# general
Start the manual block of the bogus host IP address:
Step 2
sensor(config-net-gen)# block-hosts 10.16.0.0
Step 3
Exit general submode:
sensor(config-net-gen)# exit
sensor(config-net)# exit
Apply Changes:? [yes]:
Step 4
Press Enter to apply the changes or type
Step 5
Telnet to the router and verify that a deny entry for the blocked address exists in the router's ACL.
Refer to the router documentation for the procedure.
Remove the manual block by repeating Steps 1 through 4 except in Step 2 place no in front of the
Step 6
command:
sensor(config-net-gen)# no block-hosts 10.16.0.0

Enabling SSH Connections to the Network Device

If you are using SSH-DES or SSH-3DES as the communication protocol for the network device, you
must make sure you have enabled it on the device.
To enable SSH connections to the network device, follow these steps:
Log in to the CLI.
Step 1
Enter configuration mode:
Step 2
sensor# configure terminal
Enable SSH:
Step 3
sensor(config)# ssh host blocking_device_ip_ address
Type
Step 4
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 5.0
C-20
when prompted to accept the device.
yes
to discard them.
no
Appendix C
Troubleshooting
78-16527-01

Advertisement

Table of Contents
loading

Table of Contents