8-29
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2
OL-29168-01
Chapter8 Configuring Event Action Rules
Configuring OS Identifications
hp-ux—Variants of HP-UX
irix—Variants of IRIX
linux—Variants of Linux
solaris—Variants of Solaris
windows—Variants of Microsoft Windows
windows-nt-2k-xp—Variants of NT, 2000, and XP
win-nt—Specific variants of Windows NT
unknown—Unknown OS
default—Sets the value back to the system default setting.
no—Removes an entry or selection setting.
passive-traffic-analysis {enabled | disabled}—Enables/disables passive OS fingerprinting
analysis.
Configuring OS Maps
To configure OS maps, follow these steps:
Step 1
Log in to the CLI using an account with administrator privileges.
Step 2
Enter event action rules submode.
sensor# configure terminal
sensor(config)# service event-action-rules rules1
sensor(config-eve)#
Step 3
Create the OS map. Use name1, name2, and so forth to name your OS maps. Use the begin | end |
inactive | before | after keywords to specify where you want to insert the filter.
sensor(config-eve)# os-identification
sensor(config-eve-os)# configured-os-map insert name1 begin
sensor(config-eve-os-con)#
Step 4
Specify the values for this OS map:
a.
Specify the host IP address.
sensor(config-eve-os-con)# ip 192.0.2.0-192.0.2.255
b.
Specify the host OS type.
sensor(config-eve-os-con)# os unix
Caution
You can specify multiple operating systems for the same IP address. The last one in the list is the
operating system that is matched.
Step 5
Verify the settings for the OS map.
sensor(config-eve-os-con)# show settings
NAME: name1
-----------------------------------------------
ip: 192.0.2.0-192.0.2.255 default:
os: unix
-----------------------------------------------
sensor(config-eve-os-con)#