Chapter 10 Configuring the Sensor Using the CLI
Sensor Initial Configuration Tasks
10-22
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
Step 6
Type the NTP server’s key ID:
sensor(config-Host-tim-ntp)# keyId
key_ID
The key ID is a number between 1 and 65535. This is the key ID that you already
set up on the NTP server. See Step 3 of
Configuring a Cisco Router to be an NTP
Server, page 10-22
.
For example:
sensor(config-Host-tim-ntp)# keyId 100
Step 7
Type the NTP server’s key value:
sensor(config-Host-tim-ntp)# md5
key-value
The key value is text (numeric or character). This is the key value that you already
set up on the NTP server. See Step 3 of
Configuring a Cisco Router to be an NTP
Server, page 10-22
.
For example:
sensor(config-Host-tim-ntp)# keyValue
attack
Step 8
Exit NTP configuration mode:
sensor(config-Host-tim-ntp)# exit
sensor(config-Host-tim)# exit
sensor(config-Host)# exit
Step 9
Save the changes by typing yes:
Apply Changes:?[yes]
Configuring a Cisco Router to be an NTP Server
The sensor requires an authenticated connection with an NTP server if it is going
to use the NTP server as its time source. The sensor supports only the MD5 hash
algorithm for key encryption. Use the following procedure to activate a Cisco
router to act as an NTP server and use its internal clock as the time source.
Summary of Contents for IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor
Page 4: ......
Page 450: ...Appendix B Troubleshooting ...