Text Part Number OL-29168-01
Americas Headquarters
Page
Iii
N T E N T S
Advanced Setup for the Appliance
Interface Support
Understanding Inline Vlan Pair Mode
Vii
Configuring Alert Severity
Viii
Example String XL TCP Engine Match Offset Signature
Understanding Worms
Configuring Global Correlation
Configuring IP Logging
Xii
Routers
Xiii
Using Rommon
Xiv
Configuring the ASA 5585-X IPS SSP
Upgrading, Downgrading, and Installing System Images
Xvi
NotificationApp
Xvii
AIC Engine B-10
Xviii
Creating the Service Account C-5
Xix
Communication Problems
Understanding the show tech-support Command C-75
Xxi
CLI Validation Error Messages D-6
Xxii
Organization
Contents
Audience
Xxiv
Related Documentation
Conventions
Convention Indication
Xxv
Xxvi
Obtaining Documentation and Submitting a Service Request
Ii-1
Logging In Notes and Caveats
Supported User Roles
Ii-2
Logging In to the Appliance
For More Information
Config t
Connecting an Appliance to a Terminal Server
Ii-3
Exit Wr mem
Asa# session ips
Logging In to the ASA 5500-X IPS SSP
Ii-4
Asa# session
Logging In to the ASA 5585-X IPS SSP
Ii-5
Ii-6
Logging In to the Sensor
Ii-7
Ii-8
Supported IPS Platforms
IPS CLI Configuration Guide
Sensor Configuration Sequence
User Roles
Service
Administrator
Operators
Viewers
Following tips help you use the Cisco IPS CLI
CLI Behavior
Prompts
Help
Recall
Command Line Editing
Case Sensitivity
Display Options
Keys Description
Regular Expression Syntax
IPS Command Modes
Character Description
String
Matches a as well as b
Only if it is at the end of the string
Matches any character
Or more times
Sensor# configure terminal
Generic CLI Commands
CLI Keywords
OL-29168-01
Initializing Notes and Caveats
Initializing the Sensor
Understanding Initialization
Simplified Setup Mode
System Configuration Dialog
Example 2-1 Example System Configuration Dialog
Example 2-1shows a sample System Configuration Dialog
Initializing the Sensor Basic Sensor Setup
Basic Sensor Setup
Initializing the Sensor Basic Sensor Setup
Following configuration was entered
Initializing the Sensor Advanced Setup
Advanced Setup
Advanced Setup for the Appliance
Enter a subinterface number and description
Enter 1 to edit the interface configuration
Enter numbers for Vlan 1
Press Enter to return to the available interfaces menu
Press Enter to return to the top-level editing menu
Enter 2 to edit the virtual sensor configuration
Enter 2 to modify the virtual sensor configuration, vs0
Host-ip 192.168.1.2/24,192.168.1.1
Enter 2 to save the configuration
Reboot the appliance
Advanced Setup for the ASA 5500-X IPS SSP
Enter a name and description for your virtual sensor
Enter 2 to modify the virtual sensor vs0 configuration
Modify default threat prevention settings?no
Asa-ips#show tls fingerprint
Reboot the ASA 5500-X IPS SSP
Advanced Setup for the ASA 5585-X IPS SSP
Enter 2 to edit the virtual sensor configuration
Exit Service analysis-engine
Ips-ssp#show tls fingerprint
Reboot the ASA 5585-X IPS SSP
Verifying Initialization
Sensor# show configuration
View your configuration
Sensor# show tls fingerprint
Display the self-signed X.509 certificate needed by TLS
Setup Notes and Caveats
Setting Up the Sensor
Changing Network Settings
Understanding Sensor Setup
Changing the Hostname
Enter network settings mode
Exit network settings mode
Change the sensor IP address, netmask, and default gateway
Changing the IP Address, Netmask, and Gateway
Enabling and Disabling Telnet
Enable Telnet services
Verify that Telnet is enabled
Changing the Access List
Remove the entry from the access list
Verify the change you made to the access-list
Change the value back to the default
Verify the value has been set back to the default
To change the FTP timeout, follow these steps
Changing the FTP Timeout
Change the number of seconds of the FTP timeout
Verify the FTP timeout change
Verify the banner login text message
Adding a Login Banner
Add the banner login text
Verify the login text has been removed
Verify the settings
Enable a DNS server
Login-banner-text defaulted dns-primary-server
Enabling SSHv1 Fallback
Verify that SSHv1 fallback is enabled
Change the number of seconds of the CLI session timeout
Changing the CLI Session Timeout
Verify the CLI session timeout change
Exit authentication mode
TLSDHERSAWITHAES256CBCSHA256 TLSDHEDSSWITHAES256CBCSHA256
Changing Web Server Settings
When disabled, the client can use the following ciphers
Change the port number
Sensor# configure terminal Sensorconfig# service web-server
Turn on logging for web session inactivity timeouts
Specify the web session inactivity timeout
Verify the defaults have been replaced
Turn on TLS client ciphers restriction
Adding and Removing Users
Configuring Authentication and User Parameters
Sensorconfig# username tester privilege administrator
Sensorconfig# username username password password privilege
Specify the parameters for the user
Sensor# show users all
Sensor# configure terminal Sensorconfig# no username jsmith
Configuring Authentication
To remove a user, use the no form of the command
Radius Authentication Options
Configuring Local or Radius Authentication
Enter AAA submode
Sensorconfig-aaa-rad#default-user-role operator
Enter the Radius server IP address
Ips-role=administrator Ips-role=service
Enter the IP address of the second Radius server
Specify the type of console authentication
AAA Radius Users
Configuring Packet Command Restriction
Exit AAA mode
Check your new setting
Enter authentication submode
Sensorconfig-aut#permit-packet-logging true
Sensorconfig-aut#permit-packet-logging false
Sensorconfig# user username privilege service
Creating the Service Account
Radius Authentication Functionality and Limitations
Service Account and Radius Authentication
Configuring Passwords
Exit configuration mode
Changing User Privilege Levels
Change your password
Change the privilege level from viewer to operator
Showing User Status
Display your current level of privilege
Verify all users. The account of the user jsmith is locked
Example
Configuring the Password Policy
To unlock the account of jsmith, reset the password
Locking User Accounts
Set the value back to the system default setting
Check that the setting has returned to the default
Unlocking User Accounts
Enter global configuration mode
Parentheses
Unlock the account
IPS Standalone Appliances
Configuring Time
Time Sources and the Sensor
ASA IPS Modules
Configuring Time on the Sensor
Correcting Time on the Sensor
Symbol
Manually Setting the System Clock
Displaying the System Clock
Sensor# show clock
Enter the month you want to start summertime settings
Configuring Recurring Summertime Settings
Enter start summertime submode
Sensor# clock set 1321 Mar 29
Enter the month you want to end summertime settings
Verify your settings
Enter end summertime submode
Specify the local time zone used during summertime
Exit recurring summertime submode
Configuring Nonrecurring Summertime Settings
Exit non-recurring summertime submode
Configuring Time Zones Settings
Configuring NTP
Exit time zone settings submode
Sensorconfig-hos-tim#standard-time-zone-name CST
Example
Configuring a Cisco Router to be an NTP Server
Enter service host mode
Configuring the Sensor to Use an NTP Time Source
Configure unauthenticated NTP Enter NTP configuration mode
Verify the unauthenticated NTP settings
Configure authenticated NTP Enter NTP configuration mode
Configuring SSH
Verify the NTP settings
Exit NTP configuration mode
Adding Hosts to the SSH Known Hosts List
Understanding SSH
Add an entry to the known hosts list
Sensorconfig# ssh host-key
View the key for a specific IP address
Sensor# show ssh host-keys
Adding Authorized RSA1 and RSA2 Keys
Sensorconfig# no ssh host-key
Generating the RSA Server Host Key
Sensor# show ssh server-key
Sensor# ssh generate-key
Understanding TLS
Configuring TLS
Adding TLS Trusted Hosts
Sensorconfig# tls trusted-host ip-address 10.89.146.110 port
View the fingerprint for a specific host
Displaying and Generating the Server Certificate
Remove an entry from the trusted hosts list
Verify that the key was generated
Understanding the License Key
Installing the License Key
Obtaining and Installing the License Key
Service Programs for IPS Products
Installing the License Key
Verify the sensor is licensed
Licensing the ASA 5500-X IPS SSP
Sensor# erase license-key
Uninstalling the License Key
Verify the sensor key has been uninstalled
Setting Up the Sensor Installing the License Key
OL-29168-01
Interface Notes and Caveats
Configuring Interfaces
IPS Interfaces
Understanding Interfaces
Sensor Command and Control Interface
Command and Control Interface
Sensing Interfaces
TCP Reset Interfaces
Understanding Alternate TCP Reset Interfaces
2lists the alternate TCP reset interfaces
Designating the Alternate TCP Reset Interface
Sensor Alternate TCP Reset Interface
None
Base Chassis Cards Sensing Ports Inline Interface Pairs
Interface Support
Interfaces Not
Combinations Supporting Command and Control
Interface Configuration Restrictions
Configuring Interfaces Understanding Interfaces
Interface Configuration Sequence
Configuring Physical Interfaces
Display the list of available interfaces
Configuring the Physical Interface Settings
Specify the interface for promiscuous mode
Add a description of this interface
Remove TCP resets from an interface
Sensorconfig-int-phy#alt-tcp-reset-interface none
Exit interface submode
Configuring Promiscuous Mode
Understanding Promiscuous Mode
IPv6, Switches, and Lack of Vacl Capture
Configuring Promiscuous Mode
Set span 930, 932, 960, 962 4/1-4 both
Configuring Inline Interface Mode
Understanding Inline Interface Mode
Creating Inline Interface Pairs
Configuring Inline Interface Pairs
Name the inline pair
Enable the interfaces assigned to the interface pair
Display the available interfaces
It can monitor traffic see Step
Verify that the interfaces are enabled
Verify the inline interface pair has been deleted
Exit interface configuration submode
Sensorconfig-int#no inline-interfaces PAIR1
Understanding Inline Vlan Pair Mode
Configuring Inline Vlan Pair Mode
Configuring Inline Vlan Pairs
Been configured
Configuring Inline Vlan Pairs
OL-29168-01
Verify the inline Vlan pair settings
Set up the inline Vlan pair
Sensorconfig-int#no inline-interfaces interfacename
Designate an interface
To delete Vlan pairs Delete one Vlan pair
Configuring Vlan Group Mode
Understanding Vlan Group Mode
Deploying Vlan Groups
Configuring Vlan Groups
Configuring Inline Vlan Groups
None Subinterface-type
Assign the VLANs to this group Assign specific VLANs
Set up the Vlan group
Specify an interface
Add a description for the Vlan group
Configure unassigned VLANs
Verify the Vlan group settings
Delete Vlan groups Delete one Vlan group
Configuring Inline Bypass Mode
Understanding Inline Bypass Mode
Configure bypass mode
Configuring Inline Bypass Mode
Configuring Bypass Mode
Configuring Interface Notifications
Configuring Interface Notifications
Configuring CDP Mode
Enable CDP mode
Enabling CDP Mode
Sensorconfig-int#cdp-mode forward-cdp-packets
Displaying Interface Statistics
Sensor# show interfaces Interface Statistics
Sensor# show interfaces brief
Clear the statistics
Display the statistics for a specific interface
Sensor# show interfaces Management0/0
Sensor# show interfaces clear Interface Statistics
Displaying Interface Traffic History
To display interface traffic history, follow these steps
Displaying Historical Interface Statistics
Display the interface traffic history by the hour
Display the interface traffic history by the minute
Bytes Received Mbps
Virtual Sensor Notes and Caveats
Configuring Virtual Sensors
Advantages and Restrictions of Virtualization
Understanding the Analysis Engine
Understanding Virtual Sensors
Inline TCP Session Tracking Mode
Http Advanced Decoding
Normalization and Inline TCP Evasion Protection Mode
Adding, Editing, and Deleting Virtual Sensors
Restrictions
Adding Virtual Sensors
Adding a Virtual Sensor
Sensorconfig-ana-vir#description virtual sensor
Add a virtual sensor
Add a description for this virtual sensor
Verify the virtual sensor settings
Enable Http advanced decoding
Assign an event action rules policy to this virtual sensor
Assign a signature definition policy to this virtual sensor
Exit analysis engine mode
Editing or Deleting a Virtual Sensor
Editing and Deleting Virtual Sensors
Edit the virtual sensor, vs1
Edit the description of this virtual sensor
Delete a virtual sensor
Verify the edited virtual sensor settings
Sensorconfig-ana-vir#physical-interface GigabitEthernet0/2
Sensorconfig-ana# exit
Creating a Global Variable
Configuring Global Variables
Create the variable for the maximum number of open IP logs
Create the flow depth variable
Sensor# show statistic analysis-engine
Create the variable for service activity
Verify the global variable settings
OL-29168-01
Understanding Policies
Signature Definition Notes and Caveats
Working With Signature Definition Policies
Sensor# list signature-definition-configurations
Delete a signature definition policy
Sensor# copy signature-definition sig0 sig1
Confirm the signature definition policy has been deleted
Reset a signature definition policy to factory settings
Understanding Signatures
Creating Signature Variables
Configuring Signature Variables
Understanding Signature Variables
Adding, Editing, and Deleting Signature Variables
Signature Definition Options
Configuring Signatures
Configuring Alert Frequency
Specify the signature you want to configure
Configuring Alert Frequency
Enter alert frequency submode
Specify the summary key
Configuring Alert Severity
Configuring Alert Severity
To configure the alert severity, follow these steps
Assign the alert severity
Exit signatures submode
Configuring the Event Counter
Configuring the Event Counter
Enter event counter submode
Optional Enable alert interval
Specify the signature fidelity rating for this signature
Configuring Signature Fidelity Rating
Configuring the Signature Fidelity Rating
Choose the signature you want to configure
Configuring the Status of Signatures
Changing the Signature Status
Change the status for this signature
Specify the vulnerable OSes for this signature
Configuring the Vulnerable OSes for a Signature
Configuring Vulnerable OSes
Assigning Actions to Signatures
Specify the percentage for rate limiting
Configuring Event Actions
Configure the event action
Exit event action submode
Configuring AIC Signatures
Understanding the AIC Engine
AIC Engine and Sensor Performance
Configuring the Application Policy
Enable inspection of FTP traffic
Configuring the Application Policy
Enable Http application policy enforcement
Sensorconfig-sig-app-htt#aic-web-ports 80-80,3128-3128
Signature ID Define Request Method
AIC Request Method Signatures
Signature ID Signature Description
AIC Mime Define Content Type Signatures
Signature ID Signature Description
Signature ID Signature Description
Signature ID Transfer Encoding Method
AIC Transfer Encoding Signatures
Signature ID FTP Command
AIC FTP Commands Signatures
Creating an AIC Signature
Defining a MIME-Type Policy Signature
Define the content type
Specify the event action
Define the signature type
Signature ID and Name Description Range Default Action
Configuring IP Fragment Reassembly
Understanding IP Fragment Reassembly
For More Information
Configuring the Method for IP Fragment Reassembly
Configuring IP Fragment Reassembly Parameters
Enter edit default signatures submode
Specify the engine
Understanding TCP Stream Reassembly
Configuring TCP Stream Reassembly
Configuring the IP Fragment Reassembly Method
Verify the setting
TCP Stream Reassembly Signatures and Configurable Parameters
TCP Stream Reassembly Signatures
SYN
SYN
Configuring TCP Stream Reassembly Signatures
Configuring the Mode for TCP Stream Reassembly
Sensorconfig-sig-str#tcp-reassembly-mode strict
Configuring the TCP Stream Reassembly Parameters
Sensorconfig-sig-str#tcp-3-way-handshake-required true
Configuring IP Logging Parameters
Configuring IP Logging
Specify the number of packets you want logged
Specify the length of time you want the sensor to log
Sequence for Creating a Custom Signature
Creating Custom Signatures
Example String TCP Engine Signature
Creating a String TCP Engine Signature
Verify the settings
Example Service Http Engine Signature
Enter signature description mode
Creating a Service Http Engine Signature
Specify a signature name
Specify the alert traits. The valid range is from 0 to
Example Meta Engine Signature
Configure the Regex parameters
Exit alert frequency submode
Exit Regex submode
Meta Signature Engine Enhancement
Defining Signatures Creating Custom Signatures
Creating a Meta Engine Signature
Example IPv6 Engine Signature
Specify the IP version
Sensorconfig-sig-sig#engine atomic-ip-advanced
Specify IPv6
Specify the L4 protocol
Creating a String XL TCP Engine Signature
Example String XL TCP Engine Match Offset Signature
Specify the String XL TCP engine
Sensorconfig-sig-sig-str#specify-exact-match-offset yes
Specify the regex string to search for in the TCP packet
Specify an exact match offset for this signature
Specify a minimum match offset for this signature
Example String XL TCP Engine Minimum Match Length Signature
Specify a signature ID and subsignature ID for the signature
Specify a new Regex string to search for and turn on UTF-8
OL-29168-01
Event Action Rules Notes and Caveats
Configuring Event Action Rules
Understanding Event Action Rules
Understanding Security Policies
Signature Event Action Processor
Action filter
Alert and Log Actions
Deny Actions
Understanding Deny Packet Inline
Other Actions
TCP Normalizer Signature Warning
Event Action Rules Configuration Sequence
Sensor# copy event-action-rules rules0 rules1
Working With Event Action Rules Policies
Working With Event Action Rules Policies
Event Action Variables
Reset an event action rules policy to factory settings
Delete an event action rules policy
Confirm the event action rules instance has been deleted
Understanding Event Action Variables
When configuring IPv6 addresses, use the following format
IPv4 Addresses
IPv6 Addresses
Working With Event Action Variables
Sensorconfig-eve#variables variable-ipv4 address
Adding, Editing, and Deleting Event Action Variables
Verify that you edited the event action rules variable
Verify that you added the event action rules variable
Delete an event action rules variable
Verify the event action rules variable you deleted
Calculating the Risk Rating
Configuring Target Value Ratings
2illustrates the risk rating formula
Understanding Threat Rating
Adding, Editing, and Deleting Target Value Ratings
Adding, Editing, and Deleting Target Value Ratings
Understanding Event Action Overrides
Configuring Event Action Overrides
Configuring Event Action Overrides
Write an alert to Event Store
Log packets from both the attacker and victim IP addresses
Write verbose alerts to Event Store
Write events that request an Snmp trap to the Event Store
Understanding Event Action Filters
Configuring Event Action Filters
Configuring Event Action Filters
OL-29168-01
Configuring Event Action Filters
Add any comments you want to use to explain this filter
Verify the settings for the filter
Edit an existing filter
Edit the parameters see Steps 4a through 4l
Verify that the filter has been moved to the inactive list
Sensorconfig-eve#filters move name1 inactive
Move a filter to the inactive list
Understanding Passive OS Fingerprinting
Configuring OS Identifications
Passive OS Fingerprinting Configuration Considerations
IP Address Range Set
Adding, Editing, Deleting, and Moving Configured OS Maps
IOS
Unix
Specify the host OS type
Configuring OS Maps
Verify the settings for the OS map
Edit an existing OS map
Enable passive OS fingerprinting
Verify that you have moved the OS maps
Move an OS map to the inactive list
Displaying and Clearing OS Identifications
Sensorconfig-eve-os#no configured-os-map name2
Delete an OS map
Verify that the OS map has been deleted
Displaying and Clearing OS Identifications
Configuring General Settings
Verify that the OS IDs have been cleared
Sensor# clear os-identification learned
Understanding Event Action Aggregation
Understanding Event Action Summarization
Configuring Event Action General Settings
Configuring the General Settings
Enable or disable the summarizer. The default is enabled
Enter general submode
Verify the settings for general submode
Configuring the Denied Attackers List
Sensorconfig-eve-gen#global-filters-status enabled disabled
Adding a Deny Attacker Entry to the Denied Attackers List
Adding Entries to the Denied Attacker List
Monitoring and Clearing the Denied Attackers List
Remove the deny attacker entry from the list
Enter yes to remove the deny attacker entry from the list
Delete the denied attackers list
Displaying and Deleting Denied Attackers
Displaying Events
Monitoring Events
Clear only the statistics
Important to know if the list has been cleared
Sensor# show events
Displaying Events
To display events from the Event Store, follow these steps
Sensor# show events alert past
Sensor# show events error warning 100000 Feb 9
Display alerts from the past 45 seconds
Display events that began 30 seconds in the past
Clearing Events from Event Store
Enter yes to clear the events
Sensor# show events past
OL-29168-01
Anomaly Detection Notes and Caveats
Configuring Anomaly Detection
Understanding Worms
Understanding Anomaly Detection
Anomaly Detection Modes
Anomaly Detection Zones
Anomaly Detection Configuration Sequence
Signature ID Subsignature ID Name Description
Anomaly Detection Signatures
Signature ID Subsignature ID Name Description
Enabling Anomaly Detection
Enable anomaly detection operational mode
Working With Anomaly Detection Policies
Exit analysis engine submode
Sensor# copy anomaly-detection ad0 ad1
Working With Anomaly Detection Policies
Delete an anomaly detection policy
Reset an anomaly detection policy to factory settings
Configuring Anomaly Detection Operational Settings
Sensor# list anomaly-detection-configurations
Verify that the anomaly detection instance has been deleted
Configuring Anomaly Detection Operational Settings
Configuring the Internal Zone
Specify the worm timeout
Sensorconfig-ano-ign#source-ip-address-range
Configuring the Internal Zone
Configuring the Internal Zone
Enable the internal zone
Configure TCP protocol Configure UDP protocol
Configure the other protocols
Configuring TCP Protocol for the Internal Zone
Configuring Internal Zone TCP Protocol
Enable TCP protocol
Them and configure your own scanner values
Enable the service for that port
Verify the TCP configuration settings
Set the scanner threshold
Configuring UDP Protocol for the Internal Zone
Enable UDP protocol
Configuring the Internal Zone UDP Protocol
Verify the UDP configuration settings
Associate a specific port with UDP protocol
Configuring Anomaly Detection Configuring the Internal Zone
Configuring the Internal Zone Other Protocols
Configuring Other Protocols for the Internal Zone
Enable the other protocols
Associate a specific number for the other protocols
Verify the other configuration settings
Configuring the Illegal Zone
Configuring the Illegal Zone
Configuring the Illegal Zone
Understanding the Illegal Zone
Sensorconfig-ano-ill#ip-address-range
Configuring TCP Protocol for the Illegal Zone
Enable the illegal zone
Configuring the Illegal Zone TCP Protocol
Enabled true defaulted Sensorconfig-ano-ill-tcp#
Configuring the Illegal Zone UDP Protocol
Configuring UDP Protocol for the Illegal Zone
Sensorconfig-ano-ill-udp-dst-yes# scanner-threshold
Configuring the Illegal Zone Other Protocols
Configuring Other Protocols for the Illegal Zone
Verify the other protocols configuration settings
Understanding the External Zone
Configuring the External Zone
Configuring the External Zone
Enable the external zone
Configuring TCP Protocol for the External Zone
Configuring the External Zone
Configuring the External Zone TCP Protocol
Sensorconfig-ano-ext-tcp#
Configuring the External Zone UDP Protocol
Configuring UDP Protocol for the External Zone
Sensorconfig-ano-ext-udp-dst-yes# scanner-threshold
Configuring Other Protocols for the External Zone
To configure other protocols for a zone, follow these steps
Configuring the External Zone Other Protocols
KB and Histograms
Configuring Learning Accept Mode
Example Histogram
Configuring Learning Accept Mode
Configuring Learning Accept Mode
Sensorconfig-ano#learning-accept-mode manual
Sensorconfig-ano#learning-accept-mode auto
Displaying KB Files
Working With KB Files
Display the KB files for all virtual sensors
Sensor# show ad-knowledge-base files
Display the KB files for a specific virtual sensor
Saving and Loading KBs Manually
Manually Saving and Loading KBs
Save the current KB file and store it as a new name
Copying, Renaming, and Erasing KBs
Remove a KB file from a specific virtual sensor
Copying, Renaming, and Removing KB Files
Rename a KB file
Comparing Two KBs
Displaying the Differences Between Two KBs
To compare two KBs, follow these steps
Locate the file you want to compare
Displaying the Thresholds for a KB
Sensor# show ad-knowledge-base vs1 files Virtual Sensor vs1
Displaying KB Thresholds
Sensor# show statistics anomaly-detection vs0
Displaying Anomaly Detection Statistics
To display anomaly detection statistics, follow these steps
Display the statistics for all virtual sensors
Disabling Anomaly Detection
Disable anomaly detection operational mode
OL-29168-01
10-1
Global Correlation Notes and Caveats
10-2
Understanding Global Correlation
Participating in the SensorBase Network
1shows how we use the data
Understanding Reputation
Type of Data Purpose
10-3
10-4
Understanding Network Participation
10-5
Understanding Efficacy
10-6
Global Correlation Features and Goals
Understanding Reputation and Risk Rating
10-7
Global Correlation Requirements
10-8
Understanding Global Correlation Sensor Health Metrics
10-9
Global Correlation Update Client
Sensorconfig-glo#global-correlation-inspection on
Configuring Global Correlation
Turn on global correlation inspection
Specify the level of global correlation inspection
Turn on reputation filtering
Configuring Network Participation
Exit global correlation submode
10-11
Turn on network participation
Turning on Network Participation
Enter yes to agree to participate in the SensorBase Network
10-12
10-13
Troubleshooting Global Correlation
Disabling Global Correlation
10-14
Displaying Global Correlation Statistics
Disabling Global Correlation
10-15
Clear the statistics for global correlation
10-16
11-1
External Product Interface Notes and Caveats
Understanding External Product Interfaces
11-2
Understanding the CSA MC
11-3
External Product Interface Issues
11-4
Configuring the CSA MC to Support the IPS Interface
Adding External Product Interfaces and Posture ACLs
11-5
Adding External Product Interfaces
11-6
Sensorconfig-ext-cis-hos#posture-acls insert name1 begin
Sensorconfig-ext-cis-hos#allow-unreachable-postures yes
Enter the network address the posture ACL will use
Choose the action deny or permit the posture ACL will take
11-8
Troubleshooting External Product Interfaces
Exit external product interface submode
12-1
IP Logging Notes and Caveats
12-2
Configuring Automatic IP Logging
Understanding IP Logging
12-3
Configuring Automatic IP Logging
Monitor the IP log status with the iplog-status command
Configuring Manual IP Logging
12-4
Sensor# iplog vs0 192.0.2.1 duration
Displaying the Contents of IP Logs
Display a brief list of all IP logs
Stopping Active IP Logs
Disabling IP Logging Sessions
Stop the IP log session
Stop all IP logging sessions on a virtual sensor
Copying IP Log Files to Be Viewed
Copying IP Log Files
12-7
12-8
Copy the IP log to your FTP or SCP server
13-1
Packet Display And Capture Notes and Caveats
13-2
Understanding Packet Display and Capture
Displaying Live Traffic on an Interface
Sensor# packet display GigabitEthernet0/1
Displaying Live Traffic From an Interface
13-3
Display information about the packet file
Capturing Live Traffic on an Interface
13-4
Expression ip proto \\tcp
View the captured packet file
Capturing Live Traffic on an Interface
13-5
Sensor# packet capture GigabitEthernet0/1
13-6
Copying the Packet File
View any information about the packet file
Erasing the Packet File
View the packet file with Wireshark or Tcpdump
Erase the packet file
Verify that you have erased the packet file
13-8
14-1
Blocking Notes and Caveats
14-2
Understanding Blocking
14-3
Vlan B
Destination IP Signature ID Signature Name Protocol
Understanding Rate Limiting
Data
Icmp
Before Configuring ARC
Understanding Service Policies for Rate Limiting
UDP
TCP
14-6
Supported Devices
14-7
Configuring Blocking Properties
Sensorconfig# service network-access
Enter network access submode
Allowing the Sensor to Block Itself
14-8
Exit network access submode
Configure the sensor not to block itself
Disabling Blocking
14-9
To disable blocking or rate limiting, follow these steps
Blocks on the devices are updated
Enable blocking on the sensor
Verify that the setting has been returned to the default
14-11
Specifying Maximum Block Entries
Sensorconfig-net-gen#default block-max-entries
Return to the default value of 250 blocks
Change the maximum number of block entries
14-12
Specifying the Block Time
Time for manual blocks is set when you request the block
Signatures
These steps
14-14
Enabling ACL Logging
14-15
Enabling Writing to Nvram
Disable writing to Nvram
Logging All Blocking Events and Errors
Verify that writing to Nvram is disabled
14-16
14-17
Configuring the Maximum Number of Blocking Interfaces
Verify the default setting
Return the setting to the default
Specify the maximum number of interfaces
Verify the number of maximum interfaces
Configuring Addresses Never to Be Blocked
Configuring Addresses Never to Block
Sensorconfig-net-gen#never-block-hosts
For a network
Specify the password for the user
Configuring User Profiles
Create the user profile name
Enter the username for that user profile
Specify the enable password for the user
Configuring Blocking and Rate Limiting Devices
How the Sensor Manages Devices
14-21
14-22
Configuring the Sensor to Manage Cisco Routers
14-23
Routers and ACLs
Specify the IP address for the router controlled by the ARC
14-24
14-25
Switches and VACLs
14-26
Sensorconfig-net-cat#communication telnet ssh-3des
Specify the Vlan number
Configuring the Sensor to Manage Cisco Firewalls
Optional Add the pre-VACL name
Optional Add the post-VACL name
14-28
Configuring the Sensor to be a Master Blocking Sensor
14-29
Configuring the Master Blocking Sensor
Sensorconfig-web# exit
Enter password
Sensorconfig# tls trusted-host ip-address 192.0.2.1 port
Add a master blocking sensor entry
Specify whether or not the host uses TLS/SSL
Configuring Network Blocking
Configuring Host Blocking
Blocking a Host
End the host block
Blocking a Network
Configuring Connection Blocking
End the network block
14-32
Blocking a Connection
Obtaining a List of Blocked Hosts and Connections
End the connection block
Blocks are
14-34
15-1
Snmp Notes and Caveats
Understanding Snmp
15-2
Configuring Snmp
15-3
Configuring Snmp General Parameters
15-4
Configuring Snmp Traps
Exit notification submode
Enable Snmp traps
Configuring Snmp Traps
Specify whether you want detailed Snmp traps
Enter the trap community string
Supported Mibs
CISCO-ENHANCED-MEMPOOL-MIB CISCO-ENTITY-ALARM-MIB
CISCO-CIDS-MIB
15-6
15-7
15-8
16-1
Displaying the Current Configuration
16-2
First Review Cisco Confidential
16-3
Displaying the Current Submode Configuration
16-4
16-5
16-6
16-7
16-8
Sensorconfig# service health-monitor
16-9
16-10
16-11
16-12
16-13
Severity warning defaulted protected entry zone-name csi
16-14
16-15
Sensorconfig# service trusted-certificate
16-16
Filtering the Current Configuration Output
To filter the more command, follow these steps
Filtering Using the More Command
Press Ctrl-Cto stop the output and return to the CLI prompt
16-17
16-18
Filtering the Current Submode Configuration Output
Filtering the Submode Output
Displaying the Contents of a Logical File
16-20
Displaying the Logical File Contents
16-21
16-22
16-23
Backing Up the Current Configuration to a Remote Server
Restoring the Current Configuration From a Backup File
16-24
Creating and Using a Backup Configuration File
Erasing the Configuration File
16-25
Press Enter to continue or enter no to stop
16-26
17-1
Administrative Tasks for the Sensor
Recovering the Password
Administrative Notes and Caveats
Understanding Password Recovery
17-2
Using the Grub Menu
Recovering the Password for the Appliance
Platform Description Recovery Method
17-3
Using Rommon
Recovering the Password for the ASA 5500-X IPS SSP
Enter the following commands to reset the password
Sample Rommon session
Press Enter to confirm
Enter your new password twice
Session to the ASA 5500-X IPS SSP
17-5
Using the Asdm
Recovering the Password for the ASA 5585-X IPS SSP
Asa# hw-module module 1 password-reset
17-6
Asa# show module
Session to the ASA 5585-X IPS SSP
17-7
Disabling Password Recovery Using the CLI
Disabling Password Recovery
Disabling Password Recovery Using the IDM or IME
17-8
Troubleshooting Password Recovery
Verifying the State of Password Recovery
Sensorconfig-hos#show settings include password
Clearing the Sensor Databases
17-10
Clearing the Sensor Database
Enter yes to clear the inspectors database
Over the past 60 minutes and over the past 72 hours
Displaying the Inspection Load of the Sensor
Show the histogram of the inspection load
17-11
17-12
17-13
Configuring Health Status Information
ASA 5500-X IPS SSP and Memory Usage
Configuring Health Statistics
Platform Yellow Red Memory Used
17-14
17-15
Set the threshold for memory usage
Set the number of days since the last signature update
Set the missed packet threshold
17-16
17-17
Showing Sensor Overall Health Status
Exit health monitoring submode
Create the banner login
Creating a Banner Login
Show the health and security status of the sensor
Enter your message
Terminating CLI Sessions
Find the CLI ID number associated with the login session
To terminate a CLI session, follow these steps
Terminate the CLI session of jsmith
17-20
Configuring Events
Modifying Terminal Properties
17-21
17-22
17-23
Clearing Events from the Event Store
Displaying the System Clock
Configuring the System Clock
17-24
Sensor# show clock detail
17-25
Manually Setting the System Clock
Clearing the Denied Attackers List
17-26
17-27
Displaying Policy Lists
Display the list of policies for event action rules
Displaying Statistics
Display the list of policies for signature definition
17-28
17-29
Administrative Tasks for the Sensor
17-30
Sensor# show statistics authentication
Display the statistics for authentication
Display the statistics for anomaly detection
17-31
Display the statistics for the Event Store
Display the statistics for the Event Server
17-32
Sensor# show statistics event-server General
Show statistics host
Display the statistics for the host
17-33
Display the statistics for the ARC
Display the statistics for the logging application
17-34
Sensor# show statistics logger
17-35
17-36
17-37
Statistics web-server
Display the statistics for the web server
17-38
Sensor# show statistics logger clear
17-39
Varlog Files
Displaying Tech Support Information
Displaying Tech Support Information
17-40
View version information
Displaying Version Information
17-41
Sensor# show version
17-42
Cancel the output and get back to the CLI prompt
View configuration information
17-43
Diagnosing Network Connectivity
Enter yes to continue the reset
Resetting the Appliance
Following example shows a successful ping
Following example shows an unsuccessful ping
Stop all applications and power down the appliance
Displaying Command History
Enter yes to continue with the reset and power down
17-45
Sensor# show inventory
Displaying Hardware Inventory
17-46
PID IPS-4360-PWR-AC
17-47
Display the route of IP packet you are interested
Tracing the Route of an IP Packet
17-48
Inventory
Show the current configuration for ARC submode
Displaying Submode Settings
Sensor config# service network-access
17-49
17-50
17-51
Show the ARC settings in terse mode
17-52
18-1
Configuring the ASA 5500-X IPS SSP
18-2
Configuration Sequence for the ASA 5500-X IPS SSP
Obtain the details about the ASA 5500-X IPS Ssps
Verifying Initialization for the ASA 5500-X IPS SSP
Confirm the information
18-3
ASA 5500-X IPS SSP and Virtualization
Creating Virtual Sensors for the ASA 5500-X IPS SSP
Creating Virtual Sensors
18-4
18-5
Creating Virtual Sensors
18-6
Sensorconfig-ana-vir#physical-interface PortChannel0/0
Asa# show ips
Assigning Virtual Sensors to Contexts
18-7
Add three context modes to multiple mode
Enter multiple mode
Assign virtual sensors to the security contexts
18-8
Configure MPF for each context
ASA 5500-X IPS SSP and Bypass Mode
Confirm the configuration
SensorApp Fails
18-10
SensorApp is Reconfigured
ASA 5500-X IPS SSP and the Normalizer Engine
18-11
ASA 5500-X IPS SSP and Jumbo Packets
ASA 5500-X IPS SSP and Memory Usage
18-12
Health and Status Information
18-13
Asa-ips#debug module-boot
18-14
Early reservations == bootmem 0000000000
18-15
18-16
18-17
18-18
IRQ
18-19
Single ASA in Fail-Close Mode
Single ASA in Fail-Open Mode
Two ASAs in Fail-Open Mode
ASA 5500-X IPS SSP Failover Scenarios
Two ASAs in Fail-Close Mode
New and Modified Commands
Configuration Examples
18-21
Firewall Mode Security Context Multiple Command Mode Routed
Defaults
Allocate-ips
Single Context System
Related Commands Description
Command History Release Modification
Examples
18-23
18-24
19-1
ASA 5585-XIPS SSP Notes and Caveats
19-2
Configuration Sequence for the ASA 5585-X IPS SSP
Obtain the details about the ASA 5585-X IPS SSP
Verifying Initialization for the ASA 5585-X IPS SSP
19-3
Asa# show module 1 details
19-4
Creating Virtual Sensors for the ASA 5585-X IPS SSP
ASA 5585-X IPS SSP and Virtualization
19-5
ASA 5585-X IPS SSP Virtual Sensor Configuration Sequence
Example, rules1
Command, for example sig1
Virtual sensor that you create
19-6
19-7
19-8
Asaconfig-ctx#
Asaconfig-ctx# Config-url disk0/c2.cfg
19-9
19-10
ASA 5585-X IPS SSP and Bypass Mode
ASA 5585-X IPS SSP and the Normalizer Engine
19-11
ASA 5585-X IPS SSP and Jumbo Packets
19-12
Ips-ssp#hardware-module module 1 recover configure
Module 1 details
Asa# hw-module module 1 reset
19-13
19-14
Ips-ssp#hw-module module 1 recover configure
19-15
Traffic Flow Stopped on IPS Switchports
Asaconfig# debug module-boot
19-16
Failover Scenarios
19-17
19-18
20-1
IPS 7.2 File List
Obtaining Cisco IPS Software
IPS Software Versioning
Enter your username and password
Downloading Cisco IPS Software
20-2
Minor Update
Major Update
Service Pack
Patch Release
20-4
Signature Update
Signature Engine Update
20-5
Recovery and System Image Files
20-6
IPS Software Release Examples
20-7
Accessing IPS Documentation
20-8
Cisco Security Intelligence Operations
21-1
Upgrade Notes and Caveats
21-2
Upgrades, Downgrades, and System Images
Upgrading the Sensor
Supported FTP and HTTP/HTTPS Servers
IPS 7.21E4 Files
21-3
21-4
Upgrade Notes and Caveats
Manually Upgrading the Sensor
Enter the password when prompted
Upgrade the sensor
Sensorconfig# upgrade url/IPS-SSP10-K9-7.2-1-E4.pkg
Upgrading the Sensor
21-6
Working With Upgrade Files
21-7
Upgrading the Recovery Partition
Configuring Automatic Updates
Configuring Automatic Upgrades
Enter the server password. The upgrade process begins
21-8
21-9
21-10
Configuring Automatic Upgrades
Specify the password of the user
Specify the username for authentication
Exit automatic upgrade submode
21-11
Sensor# autoupdatenow
Applying an Immediate Update
21-12
Sensor# show statistics host
21-13
Recovering the Application Partition
Downgrading the Sensor
Recovering the Application Partition Image
Installing System Images
Recover the application partition image
Sensorconfig# recover application-partition
21-15
Connecting an Appliance to a Terminal Server
Tftp Servers
21-16
Installing the System Image for the IPS 4345 and IPS
PCI
21-17
If necessary, assign the gateway IP address
Assign the Tftp server IP address
21-18
Rommon ping server
21-19
Installing the System Image for the IPS 4510 and IPS
Rommon
21-20
21-21
If necessary, assign the Tftp server IP address
Periodically check the recovery until it is complete
Installing the System Image for the ASA 5500-X IPS SSP
Image the ASA 5500-X IPS SSP
21-22
21-23
Installing the System Image for the ASA 5585-X IPS SSP
21-24
To enable debugging of the software installation process
Specify the default gateway of the ASA 5585-X IPS SSP
Asa# hw-module module 1 recover boot
Leave the Vlan ID at
21-26
Installing the ASA 5585-X IPS SSP System Image Using Rommon
Rommon #0 set
21-27
21-28
21-29
21-30
IPS System Design
Understanding the IPS System Architecture
Figure A-1illustrates the system design for IPS software
Figure A-2 System Design for IPS 4500 Series Sensors
System Applications
Appendix a System Architecture System Applications
For detailed information about SDEE, see SDEE, page A-33
Security Features
Understanding the MainApp
MainApp
MainApp Responsibilities
ARC
Understanding the Event Store
Event Store
Stamp Value Meaning
Event Data Structures
Table A-1shows some examples
IPS Events
NotificationApp
Vlan
PEP
CtlTransSource
Figure A-3
Attack Response Controller
Figure A-4illustrates the ARC
Understanding the ARC
ARC Features
Supported Blocking Devices
Fwsm
ACLs and VACLs
Maintaining State Across Restarts
Scenario
Connection-Based and Unconditional Blocking
To unblock an IP address
Blocking with Cisco Firewalls
To clear all blocks
No shun ip
Logger
Blocking with Catalyst Switches
Understanding the AuthenticationApp
AuthenticationApp
Authenticating Users
Configuring Authentication on the Sensor
Managing TLS and SSH Trust Relationships
Web Server
SensorApp
Understanding the SensorApp
Inline, Normalization, and Event Risk Rating Features
Packet Flow
SensorApp New Features
Signature Event Action Processor
CollaborationApp
Update Components
Error Events
SwitchApp
User Roles
CLI
Communications
Service Account
Idapi
Idconf
Cidee
Cisco IPS File Structure
Summary of Cisco IPS Applications
Using the Idapi
Application Description
CLI
Java applet that provides an Html IPS management interface
IDM
IME
Events
Understanding Signature Engines
Signature Engines
Appendix B Signature Engines Understanding Signature Engines
Appendix B Signature Engines Understanding Signature Engines
General Parameters
Master Engine
Parameter Description Value
Signature-id Specifies the ID of this signature
Sig-name
Promiscuous Delta
Vulnerable OS List
Alert Frequency
Obsoletes
Event Actions
Name Description
To Match Regular Expression
AIC Engine
\NNN
AIC Engine Parameters
Understanding the AIC Engine
AIC Engine and Sensor Performance
Parameter Description
Alarm-on-non-http-traffic
Table B-6 AIC FTP Engine Parameters
Atomic ARP Engine
Atomic Engine
Atomic IP Advanced Engine
Atomic IP Advanced Engine Restrictions
Isatap
String
IPv6
Parameter Description Value
OL-29168-01
IPV4
L4 Protocol ICMPv6
Icmp ID
L4 Protocol TCP and UDP
OL-29168-01
Atomic IP Engine
Parameter Description Value
Appendix B Signature Engines
OL-29168-01
Atomic IPv6 Signatures
Atomic IPv6 Engine
Fixed Engine
Table B-11 Fixed TCP Engine Parameters
Flood Engine
Flood Net Engine Parameters
Meta Engine
Protocol Specifies which kind of traffic to inspect
Name1
Component-list Specifies the Meta engine component
Multi String Engine
Normalizer Engine
IPv6 Fragments
IP Fragmentation Normalization
TCP Normalization
ASA IPS Modules and the Normalizer Engine
Service Engines
Service DNS Engine
Understanding the Service Engines
Service FTP Engine
Service Generic Engine
Table B-20 Service Generic Engine Parameters
Service H225 Engine
Setup
Setup
ASN.1-PER
Tpkt
Service Http Engine
Crlfcrlf
Service Ident Engine
Service Msrpc Engine
Smbcomtransaction
Service Mssql Engine
Service NTP Engine
Service RPC Engine
Service P2P Engine
Parameter Description Value
Service SMB Advanced Engine
Msrpc Uuid
Service Snmp Engine
Specify-object-id-Enables
Service SSH Engine
Service TNS Engine
State Engine
Table B-32lists the parameters specific to the State engine
String Engines
Table B-33 String Icmp Engine Parameters
Table B-35 String UDP Engine
String XL Engines
Parameter Description Value
Unsupported String XL Parameters
Data Nodes
Sweep Engines
Sweep Engine
Type
Sweep Other TCP Engine
Sweep Other TCP Engine Parameters
Traffic Anomaly Engine
Signature
Traffic Icmp Engine
Trojan Engines
Bug Toolkit
Troubleshooting
Creating and Using a Backup Configuration File
Preventive Maintenance
Understanding Preventive Maintenance
Sensor# copy current-config backup-config
Backing Up the Current Configuration to a Remote Server
Creating the Service Account
Disaster Recovery
Password Recovery
ASA 5500 series adaptive Adaptive security appliance CLI
Security appliance IPS modules Command
Using Rommon
Password-Reset issued for module ips
Recovering the Password for the ASA 5585-X IPS SSP
0123 21E4
Disabling Password Recovery
Verifying the State of Password Recovery
Synchronizing IPS Clocks with Parent Device Clocks
For the procedure for configuring NTP, see Configuring NTP,
Time Sources and the Sensor
Generate the hosts statistics again after a few minutes
Verifying the Sensor is Synchronized with the NTP Server
Generate the host statistics
Advantages and Restrictions of Virtualization
TFor More Information
To learn more about Worms, see Understanding Worms,
When to Disable Anomaly Detection
Command output
Reboot the sensor
Analysis Engine Not Responding
Enter show tech-support and save the output
External Product Interfaces Issues
Troubleshooting Loose Connections
Troubleshooting the Appliance
External Product Interfaces Troubleshooting Tips
Analysis Engine is Busy
Communication Problems
Cannot Access the Sensor CLI Through Telnet or SSH
More
Sensor# show configuration include access-list
Correcting a Misconfigured Access List
Make sure the sensor cabling is correct
Duplicate IP Address Shuts Interface Down
Make sure the IP address is correct
SensorApp and Alerting
SensorApp is Not Running
AnalysisEngine 20130410110072014 Release
Physical Connectivity, SPAN, or Vacl Port Issue
Sensor# show interfaces
Unable to See Alerts
Sensor# show interfaces FastEthernet0/1
Make sure you have Produce Alert configured
Check for alerts
Sensor# show interfaces GigabitEthernet0/1
Sensorconfig-int#physical-interfaces GigabitEthernet0/1
Sensor Not Seeing Packets
Exit the service account Log in to the sensor CLI
Cleaning Up a Corrupted SensorApp Configuration
Check to see that the interface is up and receiving packets
Replace the virtual sensor file
Start the IPS services
Troubleshooting Blocking
Blocking
Sensor# cids start
Verifying the ARC is Running
Make sure you have the latest software updates
If the ARC is not connecting, look for recurring errors
Sensor# show events error hhmmss month day year include nac
Sensor# show events error 000000 Apr 01 2011 include nac
For More Information
Verify the IP address for the managed devices
Device Access Issues
Start the manual block of the bogus host IP address
Sensorname Sensor Management Time-Based Actions Host Blocks
Blocking Not Occurring for a Signature
Enabling SSH Connections to the Network Device
Verifying the Master Blocking Sensor Configuration
Exit network access general submode
Enabling Debug Logging
Enable debug logging for all zones
Logging
View the zone names
Turn on individual zone control
Exit master zone control
Protected entry zone-name nac
Exit the logger submode
Turn on debugging for a particular zone
Press Enter to apply changes or type no to discard them
Zone Names
Table C-2lists the debug logger zone names
Zone Name Description
Directing cidLog Messages to SysLog
TCP Reset Not Occurring for a Signature
Upgrading Error
Software Upgrades
Make sure the correct alarms are being generated
Sensor# show events alert
Issues With Automatic Update
Which Updates to Apply and Their Prerequisites
Updating a Sensor with the Update Stored on the Sensor
Click the Advanced tab
Troubleshooting the IDM
Cannot Launch the IDM Loading Java Applet Failed
Delete the temp files and clear the history in the browser
Cannot Launch the IDM-The Analysis Engine Busy
Signatures Not Producing Alerts
Troubleshooting the IME
Time Synchronization on IME and the Sensor
Troubleshooting the ASA 5500-X IPS SSP
Not Supported Error Message
Health and Status Information
E1000 00000005.0 PCI INT a disabled
303
Appendix C Troubleshooting
Usb
CRS
IRQ
Failover Scenerios
ASA 5500-X IPS SSP and the Normalizer Engine
ASA 5500-X IPS SSP and Jumbo Packets
ASA 5500-X IPS SSP and Memory Usage
Hw-module module 1 reset command
Troubleshooting the ASA 5585-X IPS SSP
Reset issued for module in slot Asa# show
Mgmt IP addr 192.0.2.3
Failover Scenarios
ASA 5585-X IPS SSP and the Normalizer Engine
Traffic Flow Stopped on IPS Switchports
ASA 5585-X IPS SSP and Jumbo Packets
Gathering Information
Tech Support Information
Health and Network Security Information
Displaying Tech Support Information
Understanding the show tech-support Command
Sensor# show tech-support page System Status Report
Tech Support Command Output
= No
Displaying Version Information
Understanding the show version Command
Version Information
Version 29.1 Platform IPS4360 Serial Number
Service aaa
Displaying Statistics
Understanding the show statistics Command
Statistics Information
Percentage Thread Sec Min Average
Inspection Stats Inspector Active Call Create Delete
Display the statistics for anomaly detection
Sensor# show statistics event-store
Sensor# show statistics denied-attackers
Sensor# show statistics event-server
Threat
Multicast MTU1500 Metric1
Appendix C Troubleshooting Gathering Information
Display the statistics for the notification application
Name Current
OL-29168-01
Sensor# show statistics web-server listener-443
Interfaces Information
Understanding the show interfaces Command
Displaying Interface Traffic History
Interfaces Command Output
Avg Load Peak Load
GigabitEthernet0/1 Time Packets Received Bytes Received Mbps
Events Information
Displaying Events
Understanding the show events Command
Sensor Events
Displaying Events
100
101
CidDump Script
Clearing Events
Enter the following command
Uploading and Accessing Files on the Cisco FTP Site
102
Usr/cids/idsRoot/bin/cidDump
URI
CLI Error Messages
Reason Command
Error Message Reason Command
Packet-file but no packet-file has
System that has not been upgraded
Been captured
User attempted to downgrade a
Operator or viewer user attempted to Initial login
User attempted to cancel a CLI
Log in when the maximum number
Administrator user attempted to log Initial login
Appendix D CLI Error Messages
Reason/Location
CLI Validation Error Messages
Interface and optional sub-interface being
Detection configuration file that is currently in use
Added to the virtual sensor entry physical
Interface set has already been assigned to another
OL-29168-01
GL-1
GL-2
To detect worm-infected hosts
GL-3
GL-4
Certificate for one CA issued by another CA
Authoritative private key
GL-5
GL-6
A public outside network
Dual In-line Memory Modules
To the transmit line and reads data from the receive line
802.1q to be used
GL-8
GL-9
Procedures, and basic data transport methods
An ITU standard that governs H.245 endpoint control
GL-10
GL-11
GL-12
GL-13
Proprietary branches
Detailed information about signatures
GL-14
GL-15
GL-16
Quality and service availability
GL-17
Unauthorized activity
Network devices. Used with the IDS MC
Analysis Engine
GL-18
GL-19
GL-20
Network asset through its IP address
Authorization, and accounting
Local system. Telnet is defined in RFC
GL-21
GL-22
RFC
Through a switch. Also known as security ACLs
Version identifier. Part of the UDI
GL-23
GL-24
GL-25
Payload reassembly
Hosts
GL-26
IN-1
AIC FTP
AIC Http
IN-2
TACACS+
NAT
ARP
IN-3
IN-4
Asdm
SSP
IN-5
Radius
IN-6
BO2K
URL Cidee
IN-7
Exec
IN-8
IN-9
IN-10
IN-11
CSA MC
IN-12
TFN
IN-13
AIC FTP AIC Http
IN-14
IN-15
IN-16
Idapi
Idconf
IN-17
Idiom
ASA 5500-X IPS SSP ASA 5585-X IPS SSP
IN-18
Tcpdump
IN-19
IPS SSP
IN-20
SSH
Loki
IN-21
Snmp
IN-22
IN-23
IN-24
Sdee
RTT
Http A-33
IN-25
IN-26
IN-27
IN-28
AIC
IN-29
Cidee Idconf Idiom Sdee
Smtp
IN-30
TFN2K
TAC
TLS
IN-31
IN-32
BO2K Loki TFN2K
Sensor initialization Sensor setup Version display
Upgrade command
Sensing process not running
Viewer role privileges
IN-34