Index
IN-7
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 5.0
78-16527-01
cryptographic account
Encryption Software Export Distribution
Authorization from
18-2
obtaining
18-2
CtlTransSource
described
A-2, A-11
illustration
A-11
Ctrl-N
1-5, A-30
Ctrl-P
1-5, A-30
current-config command
12-13
current configuration
backing up
12-17
filtering output
12-10
searching output
12-10
custom signatures
configuration sequence
7-29
MEG signature
7-33
service HTTP example
7-32
string TCP
7-30
D
data structures (examples)
A-8
DDoS protocol
B-33
debug-module-boot command
C-45
default
blocking time
10-10
keywords
1-9
password
2-2
username
2-2
defining authorized keys
4-33
deleting denied attackers list
6-18, 13-9
device access issues
C-18
diagnosing network connectivity
13-22
directing output to serial port
13-22
disabling
blocking
10-6
EtherChanneling
15-22
signatures
7-10
disaster recovery
C-2
displaying
contents of logical file
12-13
current configuration
12-1
current submode configuration
12-3
events
13-5, C-64
live traffic
9-3
PEP information
13-24
statistics
13-10, C-53
submode settings
13-26
system clock
4-21, 13-7
tech support information
13-19, C-47
version
13-19, C-50
display-serial command
described
13-21
supported platforms
13-21
downgrade command
17-8
downgrading sensors
17-8
downloading
software
18-1
duplicate IP addresses
C-7
E
enable-acl-logging command
10-11
enable-detail-traps command
11-4
enable-nvram-write command
10-12
enabling
full memory tests
Catalyst software
15-24
Cisco IOS software
15-25
signatures
7-10
SPAN
Catalyst Software
15-8
Cisco IOS software
15-10
enabling debug logging
C-23
Encryption Software Export Distribution Authorization
form
cryptographic account
18-2