Chapter 10 Configuring the Sensor Using the CLI
Sensor Configuration Tasks
10-58
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
On Cisco routers and Catalyst 6500 series switches NAC creates blocks by
applying ACLs or VACLs. ACLs and VACLs permit or deny passage of data
packets through interface ports. Each ACL or VACL contains permit and deny
conditions that apply to IP addresses. The PIX Firewall does not use ACLs or
VACLs. The built-in shun/no shun command is used.
You need the following information for NAC to manage a device:
•
Login user ID
•
Login password
•
Enable password (not needed if the user has enable privileges)
•
Interfaces to be managed (for example, ethernet0, vlan100)
•
Any existing ACL information you want applied at the beginning (Pre-ACL)
or end (Post-ACL) of the ACL that will be created
Note
This does not apply to a PIX Firewall because the PIX Firewall does
not use ACLs to block.
•
Whether you are using Telnet or SSH to communicate with the device
•
IP addresses (host or range of hosts) you never want blocked
•
How long you want the blocks to last
Tip
To check the status of NAC, type show statistics networkAccess at the
sensor#
.
The output shows the devices you are managing, any active blocks, and the status
for all the devices.
Содержание IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor
Страница 4: ......
Страница 450: ...Appendix B Troubleshooting ...