2-16
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2
OL-29168-01
Chapter2 In itializing the Sensor
Advanced Setup
ftp-timeout 300
no login-banner-text
exit
time-zone-settings
offset 0
standard-time-zone-name UTC
exit
summertime-option disabled
ntp-option disabled
exit
service web-server
port 342
exit
service analysis-engine
virtual-sensor newVs
description New Sensor
signature-definition newSig
event-action-rules rules0
anomaly-detection
anomaly-detection-name ad0
exit
physical-interfaces PortChannel0/0
exit
exit
service event-action-rules rules0
overrides deny-packet-inline
override-item-status Disabled
risk-rating-range 90-100
exit
exit
[0] Go to the command prompt without saving this config.
[1] Return back to the setup without saving this config.
[2] Save this configuration and exit setup.

Step 23

Enter
2
to save the configuration.
Enter your selection[2]: 2
Configuration Saved.

Step 24

Reboot the ASA 5500-X IPS SSP.
asa-ips# reset
Warning: Executing this command will stop all applications and reboot the node.
Continue with reset? []:

Step 25

Enter
yes
to continue the reboot.

Step 26

After reboot, log in to the sensor, and display the self-signed X.509 certificate (needed by TLS).
asa-ips# show tls fingerprint
SHA1: 64:9B:AC:DE:21:62:0C:D3:57:2E:9B:E5:3D:04:8F:A7:FD:CD:6F:27

Step 27

Write down the certificate fingerprints. You need the fingerprints to check the authenticity of the certificate when using HTTPS to connect to this ASA5500-X IPS SSP with a web browser.

Step 28

Apply the most recent service pack and signature update. You are now ready to configure the ASA 5500-X IPS SSP for intrusion prevention.