3-53
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2
OL-29168-01
Chapter3 Setting Up the Sensor
Configuring TLS
Step 4
Verify that the host was added.
sensor(config)# exit
sensor# show tls trusted-hosts
10.89.146.110
sensor#
Step 5
View the fingerprint for a specific host.
sensor# show tls trusted-hosts 10.89.146.110
SHA1: B1:6F:F5:DA:F3:7A:FB:FB:93:E9:2D:39:B9:99:08:D4:47:02:F6:12
sensor#
Step 6
Remove an entry from the trusted hosts list.
sensor# configure terminal
sensor(config)# no tls trusted-host 10.89.146.110
Step 7
Verify the entry was removed from the trusted host list. The IP address no longer appears in the list.
sensor(config)# exit
sensor# show tls trusted-hosts
No entries
Displaying and Generating the Server Certificate
A TLS certificate is generated when the sensor is first started. Use the tls generate-key command to
generate a new server self-signed X.509 certificate. The IP address of the sensor is included in the
certificate. If you change the sensor IP address, the sensor automatically generates a new certificate.
Caution
The new certificate replaces the existing certificate, which requires you to update the trusted hosts lists
on remote systems with the new certificate so that future connections succeed. You can update the trusted
hosts lists on remote IPS sensors using the tls trusted-host command. If the sensor is a master blocking
sensor, you must update the trusted hosts lists on the remote sensors that are sending block requests to
the master blocking sensor.
To generate a new TLS certificate, follow these steps:
Step 1
Log in to the CLI using an account with administrator privileges.
Step 2
Generate the new certificate.
sensor# tls generate-key
SHA1 fingerprint is 4A:2B:79:A0:82:8B:65:3A:83:B5:D9:50:C0:8E:F6:C6:B0:30:47:BB
sensor#
Step 3
Verify that the key was generated.
sensor# show tls fingerprint
SHA1: 4A:2B:79:A0:82:8B:65:3A:83:B5:D9:50:C0:8E:F6:C6:B0:30:47:BB
sensor#