Chapter 10 Configuring the Sensor Using the CLI
Sensor Initial Configuration Tasks
10-18
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
Step 3
Remove the user:
sensor(config)# no username
name
The username is now removed from the sensor.
Step 4
Verify that the user has been removed.
a.
Exit configuration mode:
sensor(config)# exit
b.
View a list of all users:
sensor# show users all
A list of all user accounts is displayed. The user you removed no longer
appears in the list.
Adding Trusted Hosts
You can identify hosts (trusted hosts) that are allowed to connect to the sensor.
To add a trusted host, follow these steps:
Step 1
Log in to the CLI using an account with administrator or operator privileges.
Step 2
Enter configuration mode:
sensor# configure terminal
Step 3
Enter Service host mode:
sensor(config)# service host
Step 4
Enter configuration mode for network parameters:
sensor(config-Host)# networkParams
Step 5
Specify the allowed host:
sensor(config-Host-net)# accessList ipAddress
ip_address
The IP address is now in the list of trusted hosts.
Summary of Contents for IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor
Page 4: ......
Page 450: ...Appendix B Troubleshooting ...