Chapter 10 Configuring the Sensor Using the CLI
Sensor Initial Configuration Tasks
10-8
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
Step 15
Modify the current system date and time.
Note
This option is not available on modules. The modules get their time from
the router or switch in which they are installed.
a.
Type yes to modify the system date and time.
b.
Specify the local date.
c.
Specify the local time.
Step 16
Type 2 to save the configuration.
Enter your selection[2]: 2
Configuration Saved.
Warning: The node must be rebooted for the changes to go into effect.
Continue with reboot? [yes]:
Step 17
Type yes to reboot the sensor.
Step 18
Display the self-signed X.509 certificate (needed by TLS) by typing the following
command:
sensor# show tls fingerprint
MD5: C1:9F:DE:2A:7D:D9:9A:EE:C9:19:76:D8:0F:96:8D:EC SHA1:
DC:06:71:57:90:C7:2A:E4:6E:FE:22:78:B0:33:0F:5A:F2:4A:13:59
Step 19
Write down the certificate fingerprints.
You will need these to check the authenticity of the certificate when connecting
to this sensor with a web browser.
Step 20
Apply the most recent signature update.
See
Obtaining Cisco IDS Software, page 9-1
, for information on how to obtain the
most recent software. The Readme explains how to apply the most recent software
update.
Step 21
Assign the interfaces.
See
Assigning and Enabling the Sensing Interface, page 10-9
, for the procedure.
You are now ready to configure your sensor for intrusion detection.
Содержание IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor
Страница 4: ......
Страница 450: ...Appendix B Troubleshooting ...