10-51
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
Chapter 10 Configuring the Sensor Using the CLI
Sensor Configuration Tasks
You can also have the sensor automatically log IP packets every time a particular
signature is fired. You can specify how long you want the sensor to log IP traffic
(the default is 30 seconds), and/or now many packets and bytes you want logged.
Note
Turning on IP logging affects system performance.
Note
You cannot delete or manage IP log files. The no iplog command does not delete
IP logs, it only stops more packets from being recorded for that IP log. The IP logs
are stored in a circular buffer that is never filled because new IP logs overwrite the
old ones.
This section contains the following topics:
•
Manual IP Logging for a Specific IP Address, page 10-51
•
Automatic IP Logging for a Specific Signature, page 10-53
•
Disabling IP Logging, page 10-55
•
Copying IP Log Files to Be Viewed, page 10-56
Manual IP Logging for a Specific IP Address
You can log IP packets manually for a specific IP address. To stop logging IP
packets for a specific IP address, see
Disabling IP Logging, page 10-55
. To
automatically log IP packets as an event associated with a signature, see
Automatic IP Logging for a Specific Signature, page 10-53
. To copy and view an
IP log file, see
Copying IP Log Files to Be Viewed, page 10-56
.
To manually log packets for a specific IP address, follow these steps:
Step 1
Log in to the CLI using an account with administrator or operator privileges.
Step 2
Start IP logging for a specific IP address:
sensor# iplog
group-id ip-address
[duration
minutes
] [packets
numPackets
] [bytes
numBytes
]
Note
There is only one interface group, 0.
Содержание IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor
Страница 4: ......
Страница 450: ...Appendix B Troubleshooting ...