Appendix B Troubleshooting
Troubleshooting the 4200 Series Appliance
B-24
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
Step 2
Enter the NAC’s service configuration mode:
sensor(config)# service NetworkAccess
Step 3
Enter general NAC configuration mode:
sensor(config-NetworkAccess)# general
Step 4
Start the manual block of the bogus host IP address:
sensor(config-NetworkAccess-gen)# shun-hosts ip-address 10.16.0.0
Step 5
Exit and accept changes:
sensor(config-NetworkAccess-gen-shu)# exit
sensor(config-NetworkAccess-gen)# exit
sensor(config-NetworkAccess)# exit
Apply Changes:? [yes]: yes
Step 6
Telnet to the router and verify that a deny entry for the blocked address exists in
the router’s ACL.
Refer to the router documentation for the procedure.
Step 7
Remove the manual block by repeating Steps 1-5 except in Step 4 place no in front
of the command:
sensor(config-NetworkAccess-gen)# no shun-hosts ip-address 10.16.0.0
Enabling SSH Connections to the Network Device
If you are using SSH-DES or SSH-3DES as the communication protocol for the
network device, you must make sure you have enabled it on the device.
To enable SSH connections to the network device, follow these steps:
Step 1
Log in to the CLI.
Step 2
Enter configuration mode:
sensor# configure terminal
Содержание IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor
Страница 4: ......
Страница 450: ...Appendix B Troubleshooting ...