Cisco Systems IPS4510K9 Home Security System User Manual


 
18-6
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2
OL-29168-01
Chapter 18 Configuring the ASA 5500-X IPS SSP
Creating Virtual Sensors for the ASA 5500-X IPS SSP
Step 7
Assign a signature definition policy to this virtual sensor. If you do not want to use the default signature
definition policy, sig0, you must create a new one using the service signature-definition name
command, for example sig1.
sensor(config-ana-vir)# signature-definition sig0
Step 8
Assign the interface to one virtual sensor. By default the sensing interface is already assigned to the
default virtual sensor, vs0. You must remove it from the default virtual sensor to assign it to another
virtual sensor that you create.
sensor(config-ana-vir)# physical-interface PortChannel0/0
Step 9
Verify the virtual sensor settings.
sensor(config-ana-vir)# show settings
<protected entry>
name: vs1
-----------------------------------------------
description: virtual sensor 1 default:
signature-definition: sig0 <protected>
event-action-rules: rules0 <protected>
anomaly-detection
-----------------------------------------------
anomaly-detection-name: ad0 <protected>
operational-mode: inactive <defaulted>
-----------------------------------------------
physical-interface (min: 0, max: 999999999, current: 1)
-----------------------------------------------
name: PortChannel0/0
-----------------------------------------------
-----------------------------------------------
inline-TCP-evasion-protection-mode: strict <defaulted>
-----------------------------------------------
sensor(config-ana-vir)#
Step 10
Exit analysis engine mode.
sensor(config-ana-vir)# exit
sensor(config-ana)# exit
Apply Changes:?[yes]:
sensor(config)#
Step 11
Press Enter to apply the changes or enter
no
to discard them.
For More Information
For the procedure for enabling anomaly detection, see Enabling Anomaly Detection, page 9-8.
For the procedures for creating and configuring anomaly detection policies, see Working With
Anomaly Detection Policies, page 9-8.
For the procedure for creating and configuring event action rules policies, see Working With Event
Action Rules Policies, page 8-8.
For the procedure for creating and configuring signature definitions, Working With Signature
Definition Policies, page 7-2.