Cisco Systems IPS4510K9 Home Security System User Manual


 
2-15
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2
OL-29168-01
Chapter 2 Initializing the Sensor
Advanced Setup
Step 16
Enter
1
to use the existing anomaly-detection configuration, ad0.
Signature Definition Configuration
[1] sig0
[2] Create a new signature definition configuration
Option[2]:
Step 17
Enter
2
to create a signature-definition configuration file.
Step 18
Enter the signature-definition configuration name,
newSig
.
Event Action Rules Configuration
[1] rules0
[2] Create a new event action rules configuration
Option[2]:
Step 19
Enter
1
to use the existing event-action-rules configuration, rules0.
Note
If PortChannel 0/0 has not been assigned to vs0, you are prompted to assign it to the new virtual
sensor.
Virtual Sensor: newVs
Anomaly Detection: ad0
Event Action Rules: rules0
Signature Definitions: newSig
Monitored:
PortChannel0/0
[1] Remove virtual sensor.
[2] Modify "newVs" virtual sensor configuration.
[3] Modify "vs0" virtual sensor configuration.
[4] Create new virtual sensor.
Option:
Step 20
Press Enter to exit the interface and virtual sensor configuration menu.
Modify default threat prevention settings?[no]:
Step 21
Enter
yes
if you want to modify the default threat prevention settings.
Note
The sensor comes with a built-in override to add the deny packet event action to high risk rating
alerts. If you do not want this protection, disable automatic threat prevention.
Virtual sensor newVs is configured to prevent high risk threats in inline mode. (Risk
Rating 90-100)
Virtual sensor vs0 is configured to prevent high risk threats in inline mode.(Risk Rating
90-100)
Do you want to disable automatic threat prevention on all virtual sensors?[no]:
Step 22
Enter
yes
to disable automatic threat prevention on all virtual sensors.
The following configuration was entered.
service host
network-settings
host-ip 192.168.1.2/24,192.168.1.1
host-name asa-ips
telnet-option disabled
sshv1-fallback disabled
access-list 10.0.0.0/8
access-list 64.0.0.0/8