1-3
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2
OL-29168-01
Chapter1 Introducing the CLI Configuration Guide
User Roles
For More Information
For the procedure for logging in to your sensor, see Chapter ii, “Logging In to the Sensor.”
For the procedure for using the setup command to initialize your sensor, see Chapter 2, “Initializing
the Sensor.”
For the procedure for verifying sensor initialization, see Verifying Initialization, page2-20.
For the procedure for obtaining and installing the license key, see Installing the License Key,
page 3-54.
For the procedures for setting up your sensor, see Chapter 3, “Setting Up the Sensor.”
For the procedure for creating the service account, see Creating the Service Account, page3-28.
For the procedures for configuring interfaces on your sensor, see Chapter 4, “Configuring
Interfaces.”
For the procedures for configuring virtual sensors on your sensor, see Chapter 5, “Configuring
Virtual Sensors.”
For the procedures for configuring event action rules policies, see Chapter 8, “Configuring Event
Action Rules.”
For the procedures for configuring signatures for intrusion prevention, see Chapter 7, “Defining
Signatures.”
For the procedures for configuring global correlation, see Chapter 10, “Configuring Global
Correlation.”
For the procedure for configuring anomaly detection policies, see Chapter9, “Configuring Anomaly
Detection.”
For the procedure for setting up external product interfaces, see Chapter 11, “Configuring External
Product Interfaces.”
For the procedures for configuring IP logging, see Chapter 12, “Configuring IP Logging.”
For the procedures for configuring blocking on your sensor, see Chapter 1 4, “Configuring Attack
Response Controller for Blocking and Rate Limiting.”
For the procedures for configuring SNMP on your sensor, see Chapter 15, “Configuring SNMP.”
For the administrative procedures, see Chapter 17, “Administrative Tasks for the Sensor.”
For more information on how to obtain Cisco IPS software, see Cha pter 20, “Obtaining Software.”
For the procedures for installing system images, see Chapter21, “Upgrading, D owngrading, and
Installing System Images.”
For the procedures specific to the ASA 5500-X IPS SSP, see Chapter18, “Configuring the ASA
5500-X IPS SSP.”
For the procedures specific to the ASA 5585-X IPS SSP, see Chapter19, “Configuring the ASA
5585-X IPS SSP.”
User Roles
The Cisco CLI permits multiple users to log in at the same time. You can create and remove users from
the local sensor. You can modify only one user account at a time. Each user is associated with a role that
controls what that user can and cannot modify. The CLI supports four user roles: administrator, operator,
viewer, and service. The privilege levels for each role are different; therefore, the menus and available
commands vary for each role.