B-4
Cisco Intrusion Prevention System Appliance and Module Installation Guide for IPS 7.1
OL-24002-01
Appendix B Initializing the Sensor
Basic Sensor Setup
Purpose: Tracks product efficacy
Participation Level = "Full" additionally includes:
* Type of Data: Victim IP Address and port
Purpose: Detect threat behavioral patterns
Do you agree to participate in the SensorBase Network?[no]:
For More Information
For detailed information on the global correlationfeatures, for the IDM refer to
Configuring Global
Correlation
, for the IME refer to
Configuring Global Correlation
, and for the CLI, refer to
Configuring
Global Correlation.
Basic Sensor Setup
You can perform basic sensor setup using the
setup
command, and then finish setting up the sensor using
the CLI, the IDM, or the IME.
You can perform basic sensor setup using the
setup
command, and then finish setting up the sensor using
the CLI, IDM, or IME. To perform basic sensor setup using the
setup
command, follow these steps:
Step 1
Log in to the sensor using an account with administrator privileges.
Note
Both the default username and password are
cisco
.
Step 2
The first time you log in to the sensor you are prompted to change the default password. Passwords must
be at least eight characters long and be strong, that is, not be a dictionary word. After you change the
password, basic setup begins.
Step 3
Enter the
setup
command. The System Configuration Dialog is displayed.
Step 4
Specify the hostname. The hostname is a case-sensitive character string up to 64 characters. Numbers,
“_” and “-” are valid, but spaces are not acceptable. The default is sensor.
Step 5
Specify the IP interface. The IP interface is in the form of IP Address/Netmask,Gateway:
X.X.X.X/nn
,
Y.Y.Y.Y
, where
X.X.X.X
specifies the sensor IP address as a 32-bit address written as 4 octets
separated by periods,
nn
specifies the number of bits in the netmask, and
Y.Y.Y.Y
specifies the default
gateway as a 32-bit address written as 4 octets separated by periods.
Step 6
Enter
yes
to modify the network access list:
a.
If you want to delete an entry, enter the number of the entry and press
Enter
, or press
Enter
to get
to the Permit line.
b.
Enter the IP address and netmask of the network you want to add to the access list.
Note
For example, 10.0.0.0/8 permits all IP addresses on the 10.0.0.0 network
(10.0.0.0-10.255.255.255) and 10.1.1.0/24 permits only the IP addresses on the 10.1.1.0
subnet (10.1.1.0-10.1.1.255). If you want to permit access to a single IP address than the
entire network, use a 32-bit netmask. For example, 10.1.1.1/32 permits just the 10.1.1.1
address.
c.
Repeat Step b until you have added all networks that you want to add to the access list, and then
press
Enter
at a blank permit line to go to the next step.