ii-2
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2
OL-29168-01
Chapterii Logg ing In to the Sensor
Logging In to the Appliance
The service role does not have direct access to the CLI. Service account users are logged directly into a
bash shell. Use this account for support and troubleshooting purposes only. Unauthorized modifications
are not supported and will require the sensor to be reimaged to guarantee proper operation. You can
create only one user with the service role.
When you log in to the service account, you receive the following warning:
******************************** WARNING *****************************************
UNAUTHORIZED ACCESS TO THIS NETWORK DEVICE IS PROHIBITED.
This account is intended to be used for support and troubleshooting purposes only.
Unauthorized modifications are not supported and will require this device to be re-imaged
to guarantee proper operation.
**********************************************************************************
Note
The service role is a special role that allows you to bypass the CLI if needed. Only a user with
administrator privileges can edit the service account.
For More Information
For the procedure for creating the service account, see Creating the Service Account, page3-28.
For the procedures for adding and deleting users, see Configuring Authentication and User
Parameters, page3-18.
Logging In to the Appliance
Note
You can log in to the appliance from a console port. The currently supported Cisco IPS appliances are
the IPS 4345, IPS 4360, IPS 4510, and IPS 4520.
To log in to the appliance, follow these steps:
Step 1
Connect a console port to the sensor to log in to the appliance.
Step 2
Enter your username and password at the login prompt.
Note
The default username and password are both cisco. You are prompted to change them the first
time you log in to the appliance.You must first enter the UNIX password, which is cisco. Then
you must enter the new password twice.
login: cisco
Password:
***NOTICE***
This product contains cryptographic features and is subject to United States and local
country laws governing import, export, transfer and use. Delivery of Cisco cryptographic
products does not imply third-party authority to import, export, distribute or use
encryption. Importers, exporters, distributors and users are responsible for compliance
with U.S. and local country laws. By using this product you agree to comply with
applicable laws and regulations. If you are unable to comply with U.S. and local laws,
return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to export@cisco.com.