A-5
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
Appendix A Intrusion Detection System Architecture
System Overview
Sensor up-time is 20 days.
Using 214319104 out of 921522176 bytes of available memory (23% usage)
Using 596M out of 15G bytes of available disk space (5% usage)
MainApp 2003_Oct_10_11.16 (Release) 2003-10-10T11:01:13-0500 Running
AnalysisEngine 2003_Oct_10_11.16 (Release) 2003-10-10T11:01:13-0500 Running
Authentication 2003_Oct_10_11.16 (Release) 2003-10-10T11:01:13-0500 Running
Logger 2003_Oct_10_11.16 (Release) 2003-10-10T11:01:13-0500 Running
NetworkAccess 2003_Oct_10_11.16 (Release) 2003-10-10T11:01:13-0500 Running
TransactionSource 2003_Oct_10_11.16 (Release) 2003-10-10T11:01:13-0500 Running
WebServer 2003_Oct_10_11.16 (Release) 2003-10-10T11:01:13-0500 Running
CLI 2003_Oct_10_11.16 (Release) 2003-10-10T11:01:13-0500
Upgrade History:
* IDS-K9-min-4.1-1-S47 12:00:00 UTC Thu Jun 30 2005
IDS-K9-sp-4.1-3-S61.rpm.pkg 14:14:55 UTC Fri Feb 20 2004
Recovery Partition Version 1.2 - 4.1(1)S47
User Interaction
You can configure IDS through the CLI, the IDM, the IDS MC, or another
application using RDEP.
You can interact with IDS software in the following ways:
•
Configure sensor parameters.
You generate the initial configuration for the IDS—setting network
parameters, time, and allowed hosts—by using the setup command in the
CLI. You usually have to do this only once with a new sensor.
•
Configure blocking and interfaces.
•
Tune the configuration.
You will want to make modifications to the default configuration, primarily
the sensing engine (SensorApp), which is the portion of the application that
monitors network traffic. After initially installing the IDS on the network,
you can tune it until it is operating efficiently and only producing information
you think is useful.
Summary of Contents for IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor
Page 4: ......
Page 450: ...Appendix B Troubleshooting ...