Index
IN-26
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2
OL-29168-01
Sensor Key pane
described
3-49
sensors
access problems
C-24
application partition image
21-14
asymmetric traffic and disabling anomaly
detection
9-48, C-19
command and control interfaces (list)
4-3
configuration sequence
1-2
configuring to use NTP
3-44
corrupted SensorApp configuration
C-34
disaster recovery
C-6
downgrading
21-13
incorrect NTP configuration
C-16
initializing
2-2, 2-4
interface support
4-6
IP address conflicts
C-27
logging in
SSH
ii-6
Telnet
ii-6
loose connections
C-22
managing
firewalls
14-27
routers
14-23
switches
14-26
misconfigured access lists
C-26
no alerts
C-31, C-56
not seeing packets
C-33
NTP time source
3-44
NTP time synchronization
3-35, C-15
partitions
A-4
physical connectivity
C-30
preventive maintenance
C-2
reimaging
21-2
sensing process not running
C-28
setup command
2-2, 2-4, 2-8
time sources
3-35, C-15
troubleshooting software upgrades
C-53
upgrading
21-5
using NTP time source
3-43
server manifest described
A-28
service account
accessing
3-28, C-5
cautions
3-2, 3-28, C-5
creating
3-28, C-6
described
3-28, A-31, C-5
RADIUS authentication
3-29
TAC
A-31
troubleshooting
A-31
service anomaly-detection command
9-8
Service DNS engine
described
B-40
parameters (table)
B-40
Service engine
described
B-40
Layer 5 traffic
B-40
service event-action-rules command
8-8
Service FTP engine
described
B-41
parameters (table)
B-42
PASV port spoof
B-41
Service Generic engine
described
B-42
no custom signatures
B-42
parameters (table)
B-43
Service H225 engine
ASN.1PER validation
B-44
described
B-44
features
B-44
parameters (table)
B-45
TPKT validation
B-44
Service HTTP engine
described
7-44, B-46
parameters (table)
B-47
service HTTP engine
signature
7-45
Service IDENT engine
described
B-48