9-43
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2
OL-29168-01
Chapter9 Configuring Anomaly Detection
Working With KB Files
Note
If you use HTTPS protocol, the remote host must be a TLS trusted host.
Copying, Renaming, and Removing KB Files
To copy, rename, and remove KB files, follow these steps:
Step 1
Log in to the CLI using an account with administrator privileges.
Step 2
Locate the KB file you want to copy.
sensor# show ad-knowledge-base vs0 files
Virtual Sensor vs0
Filename Size Created
initial 84 10:24:58 CDT Tue Mar 14 2006
2006-Mar-16-10_00_00 84 10:00:00 CDT Thu Mar 16 2006
2006-Mar-17-10_00_00 84 10:00:00 CDT Fri Mar 17 2006
2006-Mar-18-10_00_00 84 10:00:00 CDT Sat Mar 18 2006
2006-Mar-19-10_00_00 84 10:00:00 CDT Sun Mar 19 2006
2006-Mar-20-10_00_00 84 10:00:00 CDT Mon Mar 20 2006
Step 3
Copy the KB file to a user on a computer with the IP address 10.1.1.1.
sensor# copy ad-knowledge-base vs0 file 2006-Mar-16-10_00_00
scp://cidsuser@10.1.1.1/AD/my-KB
password: ********
sensor#
Step 4
Rename a KB file.
sensor# rename ad-knowledge-base vs0 2006-Mar-16-10_00_00 My-KB
sensor#
Step 5
Remove a KB file from a specific virtual sensor.
sensor# erase ad-knowledge-base vs0 2006-Mar-16-10_00_00
sensor#
Step 6
Remove all KB files except the file loaded as current and the initial KB file from a virtual sensor.
sensor# erase ad-knowledge-base vs0
Warning: Executing this command will delete all virtual sensor 'vs0' knowledge bases
except the file loaded as current and the initial knowledge base.
Continue with erase? [yes]: yes
sensor#
Step 7
Remove all KB files except the file loaded as current and the initial KB file from all virtual sensors.
sensor# erase ad-knowledge-base
Warning: Executing this command will delete all virtual sensor knowledge bases except the
file loaded as current and the initial knowledge base.
Continue with erase? [yes]: yes
sensor#
For More Information
For the procedure for creating a new KB using the load command, see Saving and Loading KBs
Manually, page 9-41.
For the procedure for adding hosts to the SSH known hosts list, see Adding Hosts to the SSH Known
Hosts List, page 3-46.