Appendix B Troubleshooting
Troubleshooting the 4200 Series Appliance
B-42
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
Note
Not modifying the prompt only applies to versions before 4.1(4).
•
You must use the Windows FTP server setup option to emulate UNIX file
structure and not MS-DOS file structure.
•
If you are using SCP, make sure you have added the SSH host key to the
known hosts list.
See
Adding Known Hosts to the SSH Known Hosts List, page 10-19
, for the
procedure.
Try the manual upgrade command before attempting the automatic update. If it
works with the upgrade command and does not work with the automatic update,
try the following:
•
Determine which IDS software version your sensor has (see
Displaying the
Current Version, page B-57
, for the procedure).
Version 4.0(1) has a known problem with automatic update. Upgrade
manually to 4.1(1) before trying to configure and use automatic update.
•
Make sure the passwords configured for automatic update. Make sure they
match the same passwords used for manual update.
•
Make sure that the filenames in the FTP server are exactly what you see on
Downloads on Cisco.com. This includes capitalization.
Some Windows FTP servers allow access to the file with the incorrect
capitalization but the sensor ultimately rejects the file because the name has
changed.
•
If necessary, run tcpDump on automatic update. You can compare the
successful manual update with the unsuccessful automatic update and
troubleshoot from there.
Verifying the Version of the IDSM-2 and NM-CIDS 4.1(4) Images
The 4.1(4) application partition files for the IDSM-2 and the NM-CIDS have been
repackaged. The following new files exist:
•
IDSM-2—WS-SVC-IDSM2-K9-a-4.1-4-S91a.bin.gz
•
NM-CIDS—NM-CIDS-K9-a-4.1-4-S91a.bin
Summary of Contents for IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor
Page 4: ......
Page 450: ...Appendix B Troubleshooting ...