Chapter 10 Configuring the Sensor Using the CLI
IDSM-2 Configuration Tasks
10-88
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
5.
Perform the other initial tasks, such as adding users, trusted hosts,
configuring the sensor to use an NTP server as a time source, and so forth.
See
Sensor Initial Configuration Tasks, page 10-2
, for more information.
6.
Configure intrusion detection.
See
Sensor Configuration Tasks, page 10-35
, and IDS manager
documentation. See the Cisco Intrusion Detection System (IDS) Hardware
and Software Version 4.1 Documentation Guide that shipped with your
IDSM-2 for instructions on how to locate these documents.
7.
Perform miscellaneous tasks to keep your IDSM-2 running smoothly.
See
Sensor Administrative Tasks, page 10-24
, and
Miscellaneous Tasks,
page 10-98
, for more information.
8.
Upgrade the IDS software with new signature updates and service packs.
See
Obtaining Cisco IDS Software, page 9-1
, for more information.
9.
Reimage the application partition and the maintenance partition when
needed.
See
Reimaging the IDSM-2, page 10-124
.
This section contains the following topics:
•
Configuring the Catalyst 6500 Series Switch for Command and Control
Access to the IDSM-2, page 10-88
•
Capturing IDS Traffic, page 10-90
•
Miscellaneous Tasks, page 10-98
Configuring the Catalyst 6500 Series Switch for Command and
Control Access to the IDSM-2
After you initialize the IDSM-2, you must configure the Catalyst 6500 series
switch to have command and control access to the IDSM-2.
Содержание IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor
Страница 4: ......
Страница 450: ...Appendix B Troubleshooting ...