Chapter 10
Initializing the Sensor
Enter
Step 11
Enter your selection[2]: 2
Configuration Saved.
Enter
Step 12
Step 13
After reboot, log in to the sensor, and display the self-signed X.509 certificate (needed by TLS).
sensor# show tls fingerprint
MD5: C4:BC:F2:92:C2:E2:4D:EB:92:0F:E4:86:53:6A:C6:01
SHA1: 64:9B:AC:DE:21:62:0C:D3:57:2E:9B:E5:3D:04:8F:A7:FD:CD:6F:27
Step 14
Write down the certificate fingerprints. You need the fingerprints to check the authenticity of the
certificate when using HTTPS to connect to this appliance with a web browser.
Step 15
Apply the most recent service pack and signature update. You are now ready to configure your sensor
for intrusion prevention.
For More Information
•
•
•
Advanced Setup
This section describes how to continue with advanced setup in the CLI for the various Cisco IPS
platforms. It contains the following sections:
•
•
•
OL-18504-01
[0] Go to the command prompt without saving this config.
[1] Return to setup without saving this config.
[2] Save this configuration and exit setup.
[3] Continue to Advanced setup.
to save the configuration (or
2
to reboot the sensor.
yes
For the procedure for obtaining the most recent IPS software, see
page
11-1.
For the procedure for using HTTPS to log in to IDM, refer to
For the procedures for configuring intrusion prevention on your sensor, refer to the following guides:
–
Installing and Using Cisco Intrusion Prevention System Device Manager 7.0
–
Installing and Using Cisco Intrusion Prevention System Manager Express 7.0
Configuring the Cisco Intrusion Prevention System Sensor Using the Command Line Interface
–
7.0
Advanced Setup for the Appliance, page 10-8
Advanced Setup for the AIM IPS, page 10-13
Advanced Setup for the AIP SSM, page 10-16
Cisco Intrusion Prevention System Appliance and Module Installation Guide for IPS 7.0
to continue with advanced setup using the CLI, IDM, or IME).
3
Advanced Setup
Obtaining Cisco IPS Software,
Logging In to
IDM.
10-7