Cisco Intrusion Prevention System CLI
Configuration Guide for IPS 7.1
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Text Part Number: OL-19892-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
•Documentation Roadmap for Cisco Intrusion Prevention System
•Release Notes for Cisco Intrusion Prevention System
•Cisco Intrusion Prevention System Device Manager Configuration Guide
•Cisco Intrusion Prevention System Manager Express Configuration Guide
•Cisco Intrusion Prevention System Command Reference
•Cisco Intrusion Prevention System Appliance and Module Installation Guide
•Installling and Removing Interface Cards in Cisco IPS-4260 and IPS 4270-20
•Regulatory Compliance and Safety Information for the Cisco Intrusion Prevention System 4300
Series Appliance Sensor
•Regulatory Compliance and Safety Information for the Cisco ASA 5500-X Series Appliances and the
Cisco Intrusion Prevention System 4300 Series Appliances
•Regulatory Compliance and Safety Information for the Cisco Intrusion Prevention System 4500
Series Sensor Appliance
. In this situation, you might perform an action that could result in
Obtaining Documentation, Using the Cisco Bug Search Tool,
and Submitting a Service Request
For information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a
service request, and gathering additional information, see What’s New in Cisco Product Documentation
at: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html.
Subscribe to What’s New in Cisco Product Documentation, which lists all new and revised Cisco technical
documentation, as an RSS feed and deliver content directly to your desktop using a reader application. The
RSS feeds are a free service.
xxviii
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
CHA P T ER
1
Introducing the CLI Configuration Guide
This chapter introduces the IPS CLI configuration guide, and contains the following sections:
• Sensor Configuration Sequence, page 1-1
• IPS CLI Configuration Guide, page 1-1
• User Roles, page 1-3
• CLI Behavior, page 1-5
• Command Line Editing, page 1-6
• IPS Command Modes, page 1-7
• Regular Expression Syntax, page 1-8
• Generic CLI Commands, page 1-10
• CLI Keywords, page 1-10
IPS CLI Configuration Guide
This guide is a task-based configuration guide for the Cisco IPS 7.1 CLI. The term “sensor” is used
throughout this guide to refer to all sensor models, unless a procedure refers to a specific appliance or
module, then the specific model name is used.
For an alphabetical list of all IPS commands, refer to the Command Reference for Cisco Intrusion
Prevention System 7.1. For information on locating all IPS 7.1 documents on Cisco.com, refer to the
Documentation Roadmap for Cisco Intrusion Prevention System 7.1.
You can also use an IPS manager to configure your sensor. For information on how to access
documentation that describes how to use IPS managers, refer to the Documentation Roadmap for Cisco
Intrusion Prevention System 7.1.
Sensor Configuration Sequence
Perform the following tasks to configure the sensor:
1. Log in to the sensor.
2. Initialize the sensor by running the setup command.
3. Verify the sensor initialization.
OL-19892-01
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
1-1
Sensor Configuration Sequence
4. Create the service account. A service account is needed for special debug situations directed by
TAC. Only one user with the role of service is allowed.
5. License the sensor.
6. Perform the other initial tasks, such as adding users and trusted hosts, and so forth.
7. Make changes to the interface configuration if necessary. You configure the interfaces during
initialization.
8. Add or delete virtual sensors as necessary. You configure the virtual sensors during initialization.
9. Configure event action rules.
10. Configure the signatures for intrusion prevention.
11. Configure the sensor for global correlation.
12. Configure anomaly detection if needed. You can run anomaly detection using the default values or
you can tailor it to suit your network needs.
NoteAnomaly detection is disabled by default in IPS 7.1(2)E4 and later. You must enable it to
Chapter 1 Introducing the CLI Configuration Guide
configure or apply an anomaly detection policy. Enabling anomaly detection results in a
decrease in performance.
13. Set up any external product interfaces if needed. The CSA MC is the only external product
supported by the Cisco IPS.
14. Configure IP logging if needed.
15. Configure blocking if needed.
16. Configure SNMP if needed.
17. Perform miscellaneous tasks to keep your sensor running smoothly.
18. Upgrade the IPS software with new signature updates and service packs.
19. Reimage the application partition when needed.
For More Information
• For the procedure for logging in to your sensor, see Chapter 2, “Logging In to the Sensor.”
• For the procedure for using the setup command to initialize your sensor, see Chapter 3, “Initializing
the Sensor.”
• For the procedure for verifying sensor initialization, see Verifying Initialization, page 3-25.
• For the procedure for obtaining and installing the license key, see Installing the License Key,
page 4-56.
• For the procedures for setting up your sensor, see Chapter 4, “Setting Up the Sensor.”
• For the procedure for creating the service account, see Creating the Service Account, page 4-26.
• For the procedures for configuring interfaces on your sensor, see Chapter 5, “Configuring
Interfaces.”
• For the procedures for configuring virtual sensors on your sensor, see Chapter 6, “Configuring
Virtual Sensors.”
1-2
• For the procedures for configuring event action rules policies, see Chapter 7, “Configuring Event
Action Rules.”
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Chapter 1 Introducing the CLI Configuration Guide
• For the procedures for configuring signatures for intrusion prevention, see Chapter 8, “Defining
Signatures.”
• For the procedures for configuring global correlation, see Chapter 10, “Configuring Global
Correlation.”
• For the procedure for configuring anomaly detection policies, see Chapter 9, “Configuring Anomaly
Detection.”
• For the procedure for setting up external product interfaces, see Chapter 11, “Configuring External
Product Interfaces.”
• For the procedures for configuring IP logging, see Chapter 12, “Configuring IP Logging.”
• For the procedures for configuring blocking on your sensor, see Chapter 14, “Configuring Attack
Response Controller for Blocking and Rate Limiting.”
• For the procedures for configuring SNMP on your sensor, see Chapter 15, “Configuring SNMP.”
• For the administrative procedures, see Chapter 17, “Administrative Tasks for the Sensor.”
• For more information on how to obtain Cisco IPS software, see Chapter 21, “Obtaining Software.”
• For the procedures for installing system images, see Chapter 22, “Upgrading, Downgrading, and
Installing System Images.”
• For procedures specific to the ASA 5500 AIP SSM, see Chapter 18, “Configuring the ASA 5500
AIP SSM.”
User Roles
User Roles
• For the procedures specific to the ASA 5500-X IPS SSP, see Chapter 19, “Configuring the ASA
5500-X IPS SSP.”
• For the procedures specific to the ASA 5585-X IPS SSP, see Chapter 20, “Configuring the ASA
5585-X IPS SSP.”
The Cisco CLI permits multiple users to log in at the same time. You can create and remove users from
the local sensor. You can modify only one user account at a time. Each user is associated with a role that
controls what that user can and cannot modify. The CLI supports four user roles: administrator, operator,
viewer, and service. The privilege levels for each role are different; therefore, the menus and available
commands vary for each role.
Administrator
This user role has the highest level of privileges. Administrators have unrestricted view access and can
perform the following functions:
• Add users and assign passwords
• Enable and disable control of physical interfaces and virtual sensors
• Assign physical sensing interfaces to a virtual sensor
• Modify the list of hosts allowed to connect to the sensor as a configuring or viewing agent
OL-19892-01
• Modify sensor address configuration
• Tune signatures
• Assign configuration to a virtual sensor
• Manage routers
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
1-3
User Roles
Chapter 1 Introducing the CLI Configuration Guide
Operators
This user role has the second highest level of privileges. Operators have unrestricted view access and can
perform the following functions:
• Modify their passwords
• Tune signatures
• Manage routers
• Assign configuration to a virtual sensor
Viewers
This user role has the lowest level of privileges. Viewers can view configuration and event data and can
modify their passwords.
TipMonitoring applications only require viewer access to the sensor. You can use the CLI to set up a user
account with viewer privileges and then configure the event viewer to use this account to connect to the
sensor.
Service
This user role does not have direct access to the CLI. Service account users are logged directly into a
bash shell. Use this account for support and troubleshooting purposes only. Unauthorized modifications
are not supported and require the device to be reimaged to guarantee proper operation. You can create
only one user with the service role. In the service account you can also switch to user root by executing
su-. The root password is synchronized to the service account password. Some troubleshooting
procedures may require you to execute commands as the root user.
When you log in to the service account, you receive the following warning:
******************************* WARNING *****************************************
UNAUTHORIZED ACCESS TO THIS NETWORK DEVICE IS PROHIBITED.
This account is intended to be used for support and troubleshooting purposes only.
Unauthorized modifications are not supported and will require this device to be re-imaged
to guarantee proper operation.
*********************************************************************************
NoteThe service role is a special role that allows you to bypass the CLI if needed. Only a user with
administrator privileges can edit the service account.
NoteFor IPS 5.0 and later, you can no longer remove the cisco account. You can disable it using the no
password cisco command, but you cannot remove it. To use the no password cisco command, there
must be another administrator account on the sensor. Removing the cisco account through the service
account is not supported. If you remove the cisco account through the service account, the sensor most
likely will not boot up, so to recover the sensor you must reinstall the sensor system image.
1-4
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Chapter 1 Introducing the CLI Configuration Guide
CLI Behavior
The following tips help you use the Cisco IPS CLI.
Prompts
• You cannot change the prompt displayed for the CLI commands.
• User interactive prompts occur when the system displays a question and waits for user input. The
default input is displayed inside brackets [ ]. To accept the default input, press Enter.
Help
• To display the help for a command, type ? after the command.
The following example demonstrates the ? function:
sensor# configure ?
terminal Configure from the terminal
sensor# configure
NoteWhen the prompt returns from displaying help, the command previously entered is displayed
without the ?.
CLI Behavior
• You can type ? after an incomplete token to view the valid tokens that complete the command. If
there is a trailing space between the token and the ?, you receive an ambiguous command error:
sensor# show c ?
% Ambiguous command: “show c”
If you enter the token without the space, a selection of available tokens for the completion (with no
help description) appears:
sensor# show c?
clock configuration
sensor# show c
• Only commands available in the current mode are displayed by help.
Tab Completion
• Only commands available in the current mode are displayed by tab complete and help.
• If you are unsure of the complete syntax for a command, you can type a portion of the command and
press Tab to complete the command.
• If multiple commands match for tab completion, nothing is displayed.
Recall
• To recall the commands entered in a mode, use the Up Arrow or Down Arrow keys or press Ctrl-P
or Ctrl-N.
OL-19892-01
NoteHelp and tab complete requests are not reported in the recall list.
• A blank prompt indicates the end of the recall list.
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
1-5
Command Line Editing
Chapter 1 Introducing the CLI Configuration Guide
Case Sensitivity
• The CLI is not case sensitive, but it does echo back the text in the same case you typed it. For
example, if you type:
sensor# CONF
and press Tab , the sensor displays:
sensor# CONFigure
NoteCLI commands are not case sensitive, but values are case sensitive. Remember this when you
are creating regular expressions in signatures. A regular expression of “STRING” will not
match “string” seen in a packet.
Display Options
• —More— is an interactive prompt that indicates that the terminal output exceeds the allotted display
space. To display the remaining output, press the spacebar to display the next page of output or
press Enter to display the output one line at a time.
• To clear the current line contents and return to a blank command line, press Ctrl-C.
For More Information
For more information on CLI command regular expression syntax, see Regular Expression Syntax,
page 1-8.
Command Line Editing
Table 1-1 describes the command line editing capabilities provided by the Cisco IPS CLI.
Table 1-1Command Line Editing
KeysDescription
TabCompletes a partial command name entry. When you type a unique set of characters and
press Tab, the system completes the command name. If you type a set of characters that
could indicate more than one command, the system beeps to indicate an error. Type a
question mark (?) immediately following the partial command (no space). The system
provides a list of commands that begin with that string.
BackspaceErases the character to the left of the cursor.
EnterAt the command line, pressing Enter processes a command. At the
on a terminal screen, pressing Enter scrolls down a line.
SpacebarEnables you to see more output on the terminal screen. Press the Spacebar when you see
the line
Left arrowMoves the cursor one character to the left. When you type a command that extends
beyond a single line, you can press the Left Arrow key repeatedly to scroll back toward
the system prompt and verify the beginning of the command entry.
Right arrow Moves the cursor one character to the right.
Up Arrow
or Ctrl-P
Recalls commands in the history buffer, beginning with the most recent command.
Repeat the key sequence to recall successively older commands.
---More--- prompt
---More--- on the screen to display the next screen.
1-6
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Chapter 1 Introducing the CLI Configuration Guide
Table 1-1Command Line Editing (continued)
KeysDescription
Down
Arrow or
Ctrl-N
Returns to more recent commands in the history buffer after recalling commands with
the Up Arrow or Ctrl-P. Repeat the key sequence to recall successively more recent
commands.
Ctrl-AMoves the cursor to the beginning of the line.
Ctrl-BMoves the cursor back one character.
Ctrl-DDeletes the character at the cursor.
Ctrl-EMoves the cursor to the end of the command line.
Ctrl-FMoves the cursor forward one character.
Ctrl-KDeletes all characters from the cursor to the end of the command line.
Ctrl-L Clears the screen and redisplays the system prompt and command line
Ctrl-TTransposes the character to the left of the cursor with the character located at the cursor.
Ctrl-U Deletes all characters from the cursor to the beginning of the command line.
Ctrl-V Inserts a code to indicate to the system that the keystroke immediately following should
be treated as a command entry, not as an editing key.
Ctrl-WDeletes the word to the left of the cursor.
Ctrl-YRecalls the most recent entry in the delete buffer. The delete buffer contains the last ten
items you deleted or cut.
Ctrl-ZEnds configuration mode and returns you to the EXEC prompt.
Esc-BMoves the cursor back one word.
Esc-CCapitalizes the word at the cursor.
Esc-DDeletes from the cursor to the end of the word.
Esc-FMoves the cursor forward one word.
Esc-LChanges the word at the cursor to lowercase.
Esc-UCapitalizes from the cursor to the end of the word.
IPS Command Modes
IPS Command Modes
The Cisco IPS CLI has the following command modes:
• privileged EXEC—Entered when you log in to the CLI interface.
• global configuration—Entered from privileged EXEC mode by entering configure terminal. The
command prompt is
• service mode configuration—Entered from global configuration mode by entering service
service-name. The command prompt is
characters of the service name.
• multi-instance service mode—Entered from global configuration mode by entering service
service-name component-instance-name. The command prompt is
is the first three characters of the component instance name. The only multi-instance services in the
system are anomaly detection, signature definition, and event action rules.
OL-19892-01
sensor(config)#.
sensor(config-ser)#, where ser is the first three
sensor(config-com)# where com
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
1-7
Regular Expression Syntax
Regular Expression Syntax
NoteThe syntax in this section applies only to regular expressions used as part of a CLI command. It does not
apply to regular expressions used by signatures.
Regular expressions are text patterns that are used for string matching. Regular expressions contain a
mix of plain text and special characters to indicate what kind of matching to do.For example, if you are
looking for a numeric digit, the regular expression to search for is “[0-9]”. The brackets indicate that the
character being compared should match any one of the characters enclosed within the bracket. The dash
(-) between 0 and 9 indicates that it is a range from 0 to 9. Therefore, this regular expression will match
any character from 0 to 9, that is, any digit.
To search for a specific special character, you must use a backslash before the special character. For
example, the single character regular expression “\*” matches a single asterisk.
The regular expressions defined in this section are similar to a subset of the POSIX Extended Regular
Expression definitions. In particular, “[..]”, “[==]”, and “[::]” expressions are not supported. Also,
escaped expressions representing single characters are supported. A character can be represented as its
hexadecimal value, for example, \x61 equals ‘a,’ so \x61 is an escaped expression representing the
character ‘a.’
The regular expressions are case sensitive. To match “STRING” or “string” use the following regular
expression: “[Ss][Tt][Rr][Ii][Nn][Gg].”
Table 1-2 lists the special characters.
Chapter 1 Introducing the CLI Configuration Guide
Table 1-2Regular Expression Syntax
CharacterDescription
^Beginning of the string. The expression “^A” will match an “A” only at the beginning
of the string.
^ Immediately following the left-bracket ([). Excludes the remaining characters within
brackets from matching the target string. The expression “[^0-9]” indicates that the
target character should not be a digit.
$Matches the end of the string. The expression “abc$” matches the sub-string “abc”
only if it is at the end of the string.
|Allows the expression on either side to match the target string. The expression “a|b”
matches “a” as well as “b.”
.Matches any character.
*Indicates that the character to the left of the asterisk in the expression should match 0
or more times.
+Similar to * but there should be at least one match of the character to the left of the +
sign in the expression.
?Matches the character to its left 0 or 1 times.
()Affects the order of pattern evaluation and also serves as a tagged expression that can
be used when replacing the matched sub-string with another expression.
1-8
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Chapter 1 Introducing the CLI Configuration Guide
Table 1-2Regular Expression Syntax (continued)
CharacterDescription
[]Enclosing a set of characters indicates that any of the enclosed characters may match
the target character.
\Allows specifying a character that would otherwise be interpreted as special.
\xHH represents the character whose value is the same as the value represented by
(HH) hexadecimal digits [0-9A-Fa-f]. The value must be non-zero.
BEL is the same as \x07, BS is \x08, FF is \x0C, LF is \x0A, CR is \x0D, TAB is \x09,
and VT is \x0B.
For any other character ‘c’, ‘\c’ is the same as ‘c’ except that it is never interpreted as
special
The following examples demonstrate the special characters:
• a* matches any number of occurrences of the letter a, including none.
• a+ requires that at least one letter a be in the string to be matched.
Regular Expression Syntax
• ba?b matches the string bb or bab.
• \** matches any number of asterisks (*).
To use multipliers with multiple-character patterns, you enclose the pattern in parentheses.
• (ab)* matches any number of the multiple-character string ab.
• ([A-Za-z][0-9])+ matches one or more instances of alphanumeric pairs, but not none (that is, an
empty string is not a match).
The order for matches using multipliers (*, +, or ?) is to put the longest construct first. Nested constructs
are matched from outside to inside. Concatenated constructs are matched beginning at the left side of the
construct. Thus, the regular expression matches A9b3, but not 9Ab3 because the letters are specified
before the numbers.
You can also use parentheses around a single- or multiple-character pattern to instruct the software to
remember a pattern for use elsewhere in the regular expression.
To create a regular expression that recalls a previous pattern, you use parentheses to indicate memory of
a specific pattern and a backslash (\) followed by a digit to reuse the remembered pattern. The digit
specifies the occurrence of a parentheses in the regular expression pattern. If you have more than one
remembered pattern in your regular expression, \1 indicates the first remembered pattern, and \2
indicates the second remembered pattern, and so on.
The following regular expression uses parentheses for recall:
• a(.)bc(.)\1\2 matches an a followed by any character, followed by bc followed by any character,
followed by the first any character again, followed by the second any character again.
For example, the regular expression can match aZbcTZT. The software remembers that the first
character is Z and the second character is T and then uses Z and T again later in the regular
expression.
OL-19892-01
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
1-9
Generic CLI Commands
Generic CLI Commands
The following CLI commands are generic to the Cisco IPS.
• configure terminal—Enters global configuration mode.
Global configuration commands apply to features that affect the system as a whole rather than just
one protocol or interface.
sensor# configure terminal
sensor(config)#
• service—Takes you to the following configuration submodes: analysis-engine, anomaly-detection,
NoteThe anomaly-detection, event-action-rules, and signature-definition submodes are multiple
instance services. One predefined instance is allowed for each. For anomaly-detection, the
predefined instance name is ad0. For event-action-rules, the predefined instance name is
rules0. For signature-definition, the predefined instance name is sig0. You can create
additional instances.
Chapter 1 Introducing the CLI Configuration Guide
• end—Exits configuration mode or any configuration submodes. It takes you back to the top-level
• exit—Exits any configuration mode or closes an active terminal session and terminates the EXEC
CLI Keywords
In general, use the no form of a command to disable a feature or function. Use the command without the
keyword no to enable a disabled feature or function. For example, the command ssh host-key ip_address
adds an entry to the known hosts table, the command no ssh host-keyip_address removes the entry from
the known hosts table. Refer to the individual commands for a complete description of what the no form
of that command does.
sensor# configure terminal
sensor(config)# service event-action-rules rules0
sensor(config-rul)#
EXEC menu.
sensor# configure terminal
sensor(config)# end
sensor#
Service configuration commands can also have a default form. Use the default form of the command to
return the command setting to its default. This keyword applies to the service submenu commands used
for application configuration. Entering
default with the command resets the parameter to the default
value. You can only use the default keyword with commands that specify a default value in the
configuration files.
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Logging In to the Sensor
This chapter explains how to log in to the sensor. It contains the following sections:
• Logging In Notes and Caveats, page 2-1
• Supported User Roles, page 2-1
• Logging In to the Appliance, page 2-2
• Connecting an Appliance to a Terminal Server, page 2-3
• Logging In to the ASA 5500 AIP SSM, page 2-4
• Logging In to the ASA 5500-X IPS SSP, page 2-5
• Logging In to the ASA 5585-X IPS SSP, page 2-6
• Logging In to the Sensor, page 2-7
Logging In Notes and Caveats
CHA P T ER
2
The following notes and caveats apply to logging in to the sensor:
• All IPS platforms allow ten concurrent log in sessions.
• The service role is a special role that allows you to bypass the CLI if needed. Only a user with
administrator privileges can edit the service account.
• You must initialize the appliance (run the setup command) from the console. After networking is
configured, SSH and Telnet are available. You can log in to the appliance from a console port.
• You log in to the ASA 5500 AIP SSM, ASA 5500-X IPS SSP, and ASA 5585-X IPS SSP from the
adaptive security appliance.
Supported User Roles
You can log in with the following user privileges:
• Administrator
• Operator
• Vi ewer
• Service
OL-19892-01
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
2-1
Logging In to the Appliance
The service role does not have direct access to the CLI. Service account users are logged directly into a
bash shell. Use this account for support and troubleshooting purposes only. Unauthorized modifications
are not supported and will require the sensor to be reimaged to guarantee proper operation. You can
create only one user with the service role.
When you log in to the service account, you receive the following warning:
******************************** WARNING *****************************************
UNAUTHORIZED ACCESS TO THIS NETWORK DEVICE IS PROHIBITED.
This account is intended to be used for support and troubleshooting purposes only.
Unauthorized modifications are not supported and will require this device to be re-imaged
to guarantee proper operation.
**********************************************************************************
NoteThe service role is a special role that allows you to bypass the CLI if needed. Only a user with
administrator privileges can edit the service account.
For More Information
• For the procedure for creating the service account, see Creating the Service Account, page 4-26.
• For the procedures for adding and deleting users, see Configuring Authentication and User
Chapter 2 Logging In to the Sensor
Parameters, page 4-16.
Logging In to the Appliance
NoteYou can log in to the appliance from a console port. The currently supported Cisco IPS appliances are
the IPS 4240, IPS 4255, and IPS 4260 [IPS 7.1(5) and later], IPS 4270-20 [IPS 7.1(3) and later],
IPS 4345 and IPS 4360 [IPS 7.1(3) and later], and IPS 4510 and IPS 4520 [IPS 7.1(4) and later].
To log in to the appliance, follow these steps:
Step 1Connect a console port to the sensor to log in to the appliance.
Step 2Enter your username and password at the login prompt.
NoteThe default username and password are both cisco. You are prompted to change them the first
time you log in to the appliance.You must first enter the UNIX password, which is cisco. Then
you must enter the new password twice.
login: cisco
Password:
***NOTICE***
This product contains cryptographic features and is subject to United States and local
country laws governing import, export, transfer and use. Delivery of Cisco cryptographic
products does not imply third-party authority to import, export, distribute or use
encryption. Importers, exporters, distributors and users are responsible for compliance
with U.S. and local country laws. By using this product you agree to comply with
applicable laws and regulations. If you are unable to comply with U.S. and local laws,
return this product immediately.
2-2
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Chapter 2 Logging In to the Sensor
Connecting an Appliance to a Terminal Server
If you require further assistance please contact us by sending email to export@cisco.com.
***LICENSE NOTICE***
There is no license key installed on the system.
Please go to http://www.cisco.com/go/license to obtain a new license or install a license.
sensor#
For More Information
• For the procedure for connecting an appliance to a terminal server, see Connecting an Appliance to
a Terminal Server, page 2-3.
• For the procedure for using the setup command to initialize the appliance, see Basic Sensor Setup,
page 3-5.
Connecting an Appliance to a Terminal Server
A terminal server is a router with multiple, low speed, asynchronous ports that are connected to other
serial devices. You can use terminal servers to remotely manage network equipment, including
appliances. To set up a Cisco terminal server with RJ-45 or hydra cable assembly connections, follow
these steps:
Step 1Connect to a terminal server using one of the following methods:
• For terminal servers with RJ-45 connections, connect a rollover cable from the console port on the
appliance to a port on the terminal server.
• For hydra cable assemblies, connect a straight-through patch cable from the console port on the
appliance to a port on the terminal server.
Step 2Configure the line and port on the terminal server. In enable mode, enter the following configuration,
where # is the line number of the port to be configured.
config t
line #
login
transport input all
stopbits 1
flowcontrol hardware
speed 9600
exit
exit
wr mem
Step 3Be sure to properly close a terminal session to avoid unauthorized access to the appliance. If a terminal
session is not stopped properly, that is, if it does not receive an exit(0) signal from the application that
initiated the session, the terminal session can remain open. When terminal sessions are not stopped
properly, authentication is not performed on the next session that is opened on the serial port.
CautionAlways exit your session and return to a login prompt before terminating the application used to establish
the connection.
OL-19892-01
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
2-3
Logging In to the ASA 5500 AIP SSM
CautionIf a connection is dropped or terminated by accident, you should reestablish the connection and exit
normally to prevent unauthorized access to the appliance.
Logging In to the ASA 5500 AIP SSM
You log in to the ASA 5500 AIP SSM from the adaptive security appliance.
To session in to the ASA 5500 AIP SSM from the adaptive security appliance, follow these steps:
Step 1Log in to the adaptive security appliance.
NoteIf the adaptive security appliance is operating in multi-mode, use the change system command
to get to the system level prompt before continuing.
Chapter 2 Logging In to the Sensor
Step 2Session to the ASA 5500 AIP SSM. You have 60 seconds to log in before the session times out.
asa# session 1
Opening command session with slot 1.
Connected to slot 1. Escape character sequence is 'CTRL-^X'.
Step 3Enter your username and password at the login prompt.
NoteThe default username and password are both cisco. You are prompted to change them the first
time you log in to the module. You must first enter the UNIX password, which is cisco. Then
you must enter the new password twice.
login: cisco
Password:
***NOTICE***
This product contains cryptographic features and is subject to United States and local
country laws governing import, export, transfer and use. Delivery of Cisco cryptographic
products does not imply third-party authority to import, export, distribute or use
encryption. Importers, exporters, distributors and users are responsible for compliance
with U.S. and local country laws. By using this product you agree to comply with
applicable laws and regulations. If you are unable to comply with U.S. and local laws,
return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to export@cisco.com.
2-4
***LICENSE NOTICE***
There is no license key installed on the system.
Please go to http://www.cisco.com/go/license to obtain a new license or install a license.
aip-ssm#
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Chapter 2 Logging In to the Sensor
Step 4To escape from a session and return to the adaptive security appliance prompt, do one of the following:
• Enter exit.
• Press CTRL-Shift-6-x (represented as CTRL^X).
For More Information
For the procedure for using the setup command to initialize the ASA 5500 AIP SSM, see Advanced
Setup for the ASA 5500 AIP SSM, page 3-14.
Logging In to the ASA 5500-X IPS SSP
You log in to the ASA 5500-X IPS SSP from the adaptive security appliance.
To session in to the ASA 5500-X IPS SSP from the adaptive security appliance, follow these steps:
Step 1Log in to the adaptive security appliance.
Logging In to the ASA 5500-X IPS SSP
NoteIf the adaptive security appliance is operating in multi-mode, use the change system command
to get to the system level prompt before continuing.
Step 2Session to the IPS. You have 60 seconds to log in before the session times out.
asa# session ips
Opening command session with slot 1.
Connected to slot 1. Escape character sequence is 'CTRL-^X'.
Step 3Enter your username and password at the login prompt.
NoteThe default username and password are both cisco. You are prompted to change them the first
time you log in to the module. You must first enter the UNIX password, which is cisco. Then
you must enter the new password twice.
login: cisco
Password:
***NOTICE***
This product contains cryptographic features and is subject to United States and local
country laws governing import, export, transfer and use. Delivery of Cisco cryptographic
products does not imply third-party authority to import, export, distribute or use
encryption. Importers, exporters, distributors and users are responsible for compliance
with U.S. and local country laws. By using this product you agree to comply with
applicable laws and regulations. If you are unable to comply with U.S. and local laws,
return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
OL-19892-01
If you require further assistance please contact us by sending email to export@cisco.com.
***LICENSE NOTICE***
There is no license key installed on this IPS platform.
The system will continue to operate with the currently installed
signature set. A valid license must be obtained in order to apply
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
2-5
Logging In to the ASA 5585-X IPS SSP
signature updates. Please go to http://www.cisco.com/go/license
to obtain a new license or install a license.
asa-ips#
Step 4To escape from a session and return to the adaptive security appliance prompt, do one of the following:
• Enter exit.
• Press CTRL-Shift-6-x (represented as CTRL^X).
For More Information
For the procedure for using the setup command to initialize the ASA 5500-X IPS SSP, see Advanced
Setup for the ASA 5500-X IPS SSP, page 3-18.
Logging In to the ASA 5585-X IPS SSP
You log in to the ASA 5585-X IPS SSP from the adaptive security appliance.
To session in to the ASA 5585-X IPS SSP from the adaptive security appliance, follow these steps:
Chapter 2 Logging In to the Sensor
Step 1Log in to the adaptive security appliance.
NoteIf the adaptive security appliance is operating in multi-mode, use the change system command
to get to the system level prompt before continuing.
Step 2Session to the ASA 5585-X IPS SSP. You have 60 seconds to log in before the session times out.
asa# session 1
Opening command session with slot 1.
Connected to slot 1. Escape character sequence is 'CTRL-^X'.
Step 3Enter your username and password at the login prompt.
NoteThe default username and password are both cisco. You are prompted to change them the first
time you log in to the module. You must first enter the UNIX password, which is cisco. Then
you must enter the new password twice.
login: cisco
Password:
***NOTICE***
This product contains cryptographic features and is subject to United States and local
country laws governing import, export, transfer and use. Delivery of Cisco cryptographic
products does not imply third-party authority to import, export, distribute or use
encryption. Importers, exporters, distributors and users are responsible for compliance
with U.S. and local country laws. By using this product you agree to comply with
applicable laws and regulations. If you are unable to comply with U.S. and local laws,
return this product immediately.
2-6
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to export@cisco.com.
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Chapter 2 Logging In to the Sensor
***LICENSE NOTICE***
There is no license key installed on the system.
Please go to http://www.cisco.com/go/license to obtain a new license or install a license.
ips-ssp#
Step 4To escape from a session and return to the adaptive security appliance prompt, do one of the following:
• Enter exit.
• Press CTRL-Shift-6-x (represented as CTRL^X).
For More Information
For the procedure for using the setup command to initialize the ASA 5585-X IPS SSP, see Advanced
Setup for the ASA 5585-X IPS SSP, page 3-21.
Logging In to the Sensor
Logging In to the Sensor
NoteAfter you have initialized the sensor using the setup command and enabled Telnet, you can use SSH or
Telnet to log in to the sensor.
To log in to the sensor using Telnet or SSH, follow these steps:
Step 1To log in to the sensor over the network using SSH or Telnet.
ssh sensor_ip_address
telnet sensor_ip_address
Step 2Enter your username and password at the login prompt.
login: ******
Password: ******
***NOTICE***
This product contains cryptographic features and is subject to United States and local
country laws governing import, export, transfer and use. Delivery of Cisco cryptographic
products does not imply third-party authority to import, export, distribute or use
encryption. Importers, exporters, distributors and users are responsible for compliance
with U.S. and local country laws. By using this product you agree to comply with
applicable law s and regulations. If you are unable to comply with U.S. and local laws,
return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to export@cisco.com.
OL-19892-01
***LICENSE NOTICE***
There is no license key installed on the system.
Please go to http://www.cisco.com/go/license to obtain a new license or install a license.
sensor#
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
2-7
Logging In to the Sensor
Chapter 2 Logging In to the Sensor
2-8
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
CHA P T ER
3
Initializing the Sensor
This chapter describes how to use the setup command to initialize the sensor, and contains the following
sections:
• Initializing Notes and Caveats, page 3-1
• Understanding Initialization, page 3-2
• Participating in the SensorBase Network, page 3-2
• Simplified Setup Mode, page 3-3
• System Configuration Dialog, page 3-3
• Basic Sensor Setup, page 3-5
• Advanced Setup, page 3-8
• Advanced Setup, page 3-8
• Verifying Initialization, page 3-25
Initializing Notes and Caveats
The following notes and caveats apply to initializing the sensor:
• You must be administrator to use the setup command.
• You must have a valid sensor license for global correlation features to function. You can still
configure and display statistics for the global correlation features, but the global correlation
databases are cleared and no updates are attempted. Once you install a valid license, the global
correlation features are reactivated.
• The currently supported Cisco IPS appliances are the IPS 4240, IPS 4255, and IPS 4260 [IPS 7.1(5)
and later], IPS 4270-20 [IPS 7.1(3) and later], IPS 4345 and IPS 4360 [IPS 7.1(3) and later], and
IPS 4510 and IPS 4520 [IPS 7.1(4) and later].
• You do not need to configure interfaces on the ASA IPS modules (ASA 5500 AIP SSM,
ASA 5500-X IPS SSP, and ASA 5585-X IPS SSP). You should ignore the modify interface default
VLAN setting in setup. The separation of traffic across virtual sensors is configured differently for
the ASA IPS modules than for other sensors.
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
3-1
Understanding Initialization
Understanding Initialization
After you install the sensor on your network, you must use the setup command to initialize it so that you
can communicate with it over the network. You cannot use the IDM or the IME to configure the sensor
until you initialize the sensor using the setup command.
With the setup command, you configure basic sensor settings, including the hostname, IP interfaces,
access control lists, global correlation servers, and time settings. You can continue using advanced setup
in the CLI to enable Telnet, configure the web server, and assign and enable virtual sensors and
interfaces, or you can use the Startup Wizard in the IDM or the IME. After you configure the sensor with
the setup command, you can change the network settings in the IDM or the IME.
NoteYou must be administrator to use the setup command.
Participating in the SensorBase Network
The Cisco IPS contains a security capability, Cisco Global Correlation, which uses the immense security
intelligence that we have amassed over the years. At regular intervals, the Cisco IPS receives threat
updates from the Cisco SensorBase Network, which contain detailed information about known threats
on the Internet, including serial attackers, Botnet harvesters, Malware outbreaks, and dark nets. The IPS
uses this information to filter out the worst attackers before they have a chance to attack critical assets.
It then incorporates the global threat data in to its system to detect and prevent malicious activity even
earlier.
Chapter 3 Initializing the Sensor
If you agree to participate in the SensorBase Network, Cisco will collect aggregated statistics about
traffic sent to your IPS. This includes summary data on the Cisco IPS network traffic properties and how
this traffic was handled by the Cisco appliances. We do not collect the data content of traffic or other
confidential business or personal information. All data is aggregated and sent by secure HTTP to the
Cisco SensorBase Network servers in periodic intervals. All data shared with Cisco will be anonymous
and treated as strictly confidential.
Table 3-1 shows how we use the data.
Table 3-1Cisco Network Participation Data Use
Participation LevelType of DataPurpose
PartialProtocol attributes
(TCP maximum segment size and
options string, for example)
Attack type
(signature fired and risk rating, for
example)
Connecting IP address and portIdentifies attack source.
Summary IPS performance
(CPU utilization, memory usage,
inline vs. promiscuous, for
example)
FullVictim IP address and portDetects threat behavioral patterns.
Tracks potential threats and helps us to
understand threat exposure.
Used to understand current attacks and
attack severity.
Tracks product efficacy.
3-2
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Chapter 3 Initializing the Sensor
When you enable Partial or Full Network Participation, the Network Participation Disclaimer appears.
You must click Agree to participate. If you do not have a license installed, you receive a warning telling
you that global correlation inspection and reputation filtering are disabled until the sensor is licensed.
You can obtain a license at http://www.cisco.com/go/license.
For More Information
• For more information about global correlation, see Chapter 10, “Configuring Global Correlation.”
• For the procedure for obtaining a sensor license, see Installing the License Key, page 4-56.
Simplified Setup Mode
The sensor automatically calls the setup command when you connect to the sensor using a console cable
and the sensor basic network settings have not yet been configured. The sensor does not call automatic
setup under the following conditions:
• When initialization has already been successfully completed.
• If you have recovered or downgraded the sensor.
• If you have set the host configuration to default after successfully configuring the sensor using
automatic setup.
When you enter the setup command, an interactive dialog called the System Configuration Dialog
appears on the system console screen. The System Configuration Dialog guides you through the
configuration process. The values shown in brackets next to each prompt are the default values last set.
Simplified Setup Mode
System Configuration Dialog
When you enter the setup command, an interactive dialog called the System Configuration Dialog
appears on the system console screen. The System Configuration Dialog guides you through the
configuration process. The values shown in brackets next to each prompt are the current values.
You must go through the entire System Configuration Dialog until you come to the option that you want
to change. To accept default settings for items that you do not want to change, press Enter.
To return to the EXEC prompt without making changes and without going through the entire System
Configuration Dialog, press Ctrl-C. The System Configuration Dialog also provides help text for each
prompt. To access the help text, enter
When you complete your changes, the System Configuration Dialog shows you the configuration that
you created during the setup session. It also asks you if you want to use this configuration. If you enter
yes, the configuration is saved. If you enter no, the configuration is not saved and the process begins
again. There is no default for this prompt; you must enter either
You can configure daylight savings time either in recurring mode or date mode. If you choose recurring
mode, the start and end days are based on week, day, month, and time. If you choose date mode, the start
and end days are based on month, day, year, and time. Choosing disable turns off daylight savings time.
NoteYou only need to set the date and time in the System Configuration Dialog if the system is an appliance
and is NOT using NTP.
? at a prompt.
yes or no.
OL-19892-01
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
3-3
System Configuration Dialog
NoteThe System Configuration Dialog is an interactive dialog. The default settings are displayed.
Example 3-1 shows a sample System Configuration Dialog.
Example 3-1Example System Configuration Dialog
--- Basic Setup ---
--- System Configuration Dialog ---
At any point you may enter a question mark '?' for help.
User ctrl-c to abort configuration dialog at any prompt.
Default settings are in square brackets '[]'.
Current time: Wed Nov 11 21:19:51 2009
Setup Configuration last modified:
Enter host name[sensor]:
Enter IP interface[192.168.1.2/24,192.168.1.1]:
Modify current access list?[no]:
Current access list entries:
[1] 0.0.0.0/0
Delete:
Permit:
Use DNS server for Global Correlation?[no]:
DNS server IP address[171.68.226.120]:
Use HTTP proxy server for Global Correlation?[no]:
HTTP proxy server IP address[128.107.241.169]:
HTTP proxy server Port number[8080]:
Modify system clock settings?[no]: yes
Modify summer time settings?[no]:yes
Use USA SummerTime Defaults?[yes]:no
Recurring, Date or Disable?[Recurring]:
Start Month[march]:
Start Week[second]:
Start Day[sunday]:
Start Time[02:00:00]:
End Month[november]:
End Week[first]:
End Day[sunday]:
End Time[02:00:00]:
DST Zone[]:
Offset[60]:
Modify system timezone?[no]:
Timezone[UTC]:
UTC Offset[0]:
Use NTP?[no]: yes
NTP Server IP Address[]:
Use NTP Authentication?[no]: yes
NTP Key ID[]: 1
NTP Key Value[]: 8675309
Participation in the SensorBase Network allows Cisco to collect aggregated statistics
about traffic sent to your IPS.
SensorBase Network Participation level?[off]: full
Chapter 3 Initializing the Sensor
3-4
If you agree to participate in the SensorBase Network, Cisco will collect aggregated
statistics about traffic sent to your IPS.
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Chapter 3 Initializing the Sensor
This includes summary data on the Cisco IPS network traffic properties and how this
traffic was handled by the Cisco appliances. We do not collect the data content of
traffic or other sensitive business or personal information. All data is aggregated and
sent via secure HTTP to the Cisco SensorBase Network servers in periodic intervals. All
data shared with Cisco will be anonymous and treated as strictly confidential.
The table below describes how the data will be used by Cisco.
Participation Level = "Partial":
* Type of Data: Protocol Attributes (e.g. TCP max segment size and
options string)
Purpose: Track potential threats and understand threat exposure
* Type of Data: Attack Type (e.g. Signature Fired and Risk Rating)
Purpose: Used to understand current attacks and attack severity
* Type of Data: Connecting IP Address and port
Purpose: Identifies attack source
* Type of Data: Summary IPS performance (CPU utilization memory usage,
inline vs. promiscuous, etc)
Purpose: Tracks product efficacy
Participation Level = "Full" additionally includes:
* Type of Data: Victim IP Address and port
Purpose: Detect threat behavioral patterns
Do you agree to participate in the SensorBase Network?[no]:
Basic Sensor Setup
Basic Sensor Setup
You can perform basic sensor setup using the setup command, and then finish setting up the sensor using
the CLI, IDM, or IME. To perform basic sensor setup using the setup command, follow these steps:
Step 1Log in to the sensor using an account with administrator privileges.
NoteBoth the default username and password are cisco.
Step 2The first time you log in to the sensor you are prompted to change the default password. Passwords must
be at least eight characters long and be strong, that is, not be a dictionary word. After you change the
password, basic setup begins.
Step 3Enter the setup command. The System Configuration Dialog is displayed.
Step 4Specify the hostname. The hostname is a case-sensitive character string up to 64 characters. Numbers,
“_” and “-” are valid, but spaces are not acceptable. The default is sensor.
Step 5Specify the IP interface. The IP interface is in the form of IP Address/Netmask,Gateway:
X.X.X.X/nn,Y. Y. Y. Y, where X.X.X.X specifies the sensor IP address as a 32-bit address written as 4 octets
separated by periods, nn specifies the number of bits in the netmask, and Y.Y. Y.Y specifies the default
gateway as a 32-bit address written as 4 octets separated by periods.
Step 6Enter yes to modify the network access list:
a. If you want to delete an entry, enter the number of the entry and press Enter, or press Enter to get
to the Permit line.
b. Enter the IP address and netmask of the network you want to add to the access list.
OL-19892-01
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
3-5
Basic Sensor Setup
Step 7You must configure a DNS server or an HTTP proxy server for global correlation to operate:
CautionYou must have a valid sensor license for global correlation features to function. You can still configure
Chapter 3 Initializing the Sensor
NoteFor example, 10.0.0.0/8 permits all IP addresses on the 10.0.0.0 network
(10.0.0.0-10.255.255.255) and 10.1.1.0/24 permits only the IP addresses on the 10.1.1.0
subnet (10.1.1.0-10.1.1.255). If you want to permit access to a single IP address than the
entire network, use a 32-bit netmask. For example, 10.1.1.1/32 permits just the 10.1.1.1
address.
c. Repeat Step b until you have added all networks that you want to add to the access list, and then
press Enter at a blank permit line to go to the next step.
a. Enter yes to add a DNS server, and then enter the DNS server IP address.
b. Enter yes to add an HTTP proxy server, and then enter the HTTP proxy server IP address and port
number.
and display statistics for the global correlation features, but the global correlation databases are cleared
and no updates are attempted. Once you install a valid license, the global correlation features are
reactivated.
Step 8Enter yes to modify the system clock settings:
a. Enter yes to modify summertime settings.
NoteSummertime is also known as DST. If your location does not use Summertime, go to Step m.
b. Enter yes to choose the USA summertime defaults, or enter no and choose recurring, date, or disable
to specify how you want to configure summertime settings. The default is recurring.
c. If you chose recurring, specify the month you want to start summertime settings. Valid entries are
january, february, march, april, may, june, july, august, september, october, november, and
december. The default is march.
d. Specify the week you want to start summertime settings. Valid entries are first, second, third, fourth,
fifth, and last. The default is second.
e. Specify the day you want to start summertime settings. Valid entries are sunday, monday, tuesday,
wednesday, thursday, friday, and saturday. The default is sunday.
f. Specify the time you want to start summertime settings. The default is 02:00:00.
NoteThe default recurring summertime parameters are correct for time zones in the United States.
The default values specify a start time of 2:00 a.m. on the second Sunday in March, and a
stop time of 2:00 a.m. on the first Sunday in November. The default summertime offset is 60
minutes.
3-6
g. Specify the month you want summertime settings to end. Valid entries are january, february, march,
april, may, june, july, august, september, october, november, and december. The default is november.
h. Specify the week you want the summertime settings to end. Valid entries are first, second, third,
fourth, fifth, and last. The default is first.
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Chapter 3 Initializing the Sensor
i. Specify the day you want the summertime settings to end. Valid entries are sunday, monday, tuesday,
wednesday, thursday, friday, and saturday. The default is sunday.
j. Specify the time you want summertime settings to end. The default is 02:00:00.
k. Specify the DST zone. The zone name is a character string up to 24 characters long in the pattern
[A-Za-z0-9()+:,_/-]+$.
l. Specify the summertime offset. Specify the summertime offset from UTC in minutes (negative
numbers represent time zones west of the Prime Meridian). The default is 60.
m. Enter yes to modify the system time zone.
n. Specify the standard time zone name. The zone name is a character string up to 24 characters long.
o. Specify the standard time zone offset. Specify the standard time zone offset from UTC in minutes
(negative numbers represent time zones west of the Prime Meridian). The default is 0.
p. Enter yes if you want to use NTP. To use authenticated NTP, you need the NTP server IP address,
the NTP key ID, and the NTP key value. If you do not have those at this time, you can configure
NTP later. Otherwise, you can choose unauthenticated NTP.
Step 9Enter off, partial, or full to participate in the SensorBase Network Participation:
• Off—No data is contributed to the SensorBase Network.
• Partial—Data is contributed to the SensorBase Network, but data considered potentially sensitive is
filtered out and never sent.
Basic Sensor Setup
• Full—All data is contributed to the SensorBase Network except the attacker/victim IP addresses that
you exclude.
The SensorBase Network Participation disclaimer appears. It explains what is involved in participating
in the SensorBase Network.
Step 10Enter yes to participate in the SensorBase Network.
The following configuration was entered.
service host
network-settings
host-ip 192.168.1.2/24, 192.168.1.1
host-name sensor
telnet-option disabled
sshv1-fallback enabled
access-list 10.0.0.0/8
ftp-timeout 300
no login-banner-text
dns-primary-server enabled
address 171.68.226.120
exit
dns-secondary-server disabled
dns-tertiary-server disabled
http-proxy proxy-server
address 128.107.241.170
port 8080
exit
time-zone-settings
offset -360
standard-time-zone-name CST
exit
summertime-option recurring
offset 60
summertime-zone-name CDT
start-summertime
month march
week-of-month second
OL-19892-01
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
3-7
Advanced Setup
Chapter 3 Initializing the Sensor
day-of-week sunday
time-of-day 02:00:00
exit
end-summertime
month november
week-of-month first
day-of-week sunday
time-of-day 02:00:00
exit
exit
ntp-option enabled
ntp-keys 1 md5-key 8675309
ntp-servers 10.10.1.2 key-id 1
exit
service global-correlation
network-participation full
exit
[0] Go to the command prompt without saving this config.
[1] Return to setup without saving this config.
[2] Save this configuration and exit setup.
[3] Continue to Advanced setup.
Step 11Enter 2 to save the configuration (or 3 to continue with advanced setup using the CLI).
Enter your selection[2]: 2
Configuration Saved.
Step 12If you changed the time setting, enter yes to reboot the sensor.
For More Information
For the procedure for obtaining the most recent IPS software, see Obtaining Cisco IPS Software,
page 21-1.
Advanced Setup
This section describes how to continue with Advanced Setup in the CLI for the various Cisco IPS
platforms. It contains the following sections:
• Advanced Setup for the Appliance, page 3-8
• Advanced Setup for the ASA 5500 AIP SSM, page 3-14
• Advanced Setup for the ASA 5500-X IPS SSP, page 3-18
• Advanced Setup for the ASA 5585-X IPS SSP, page 3-21
Advanced Setup for the Appliance
NoteThe currently supported Cisco IPS appliances are the IPS 4240, IPS 4255, and IPS 4260 [IPS 7.1(5) and
later], IPS 4270-20 [IPS 7.1(3) and later], IPS 4345 and IPS 4360 [IPS 7.1(3) and later], and IPS 4510
and IPS 4520 [IPS 7.1(4) and later].
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
3-8
OL-19892-01
Chapter 3 Initializing the Sensor
NoteAdding new subinterfaces is a two-step process. You first organize the interfaces when you edit the
virtual sensor configuration. You then choose which interfaces and subinterfaces are assigned to which
virtual sensors.
The interfaces change according to the appliance model, but the prompts are the same for all models. To
continue with advanced setup for the appliance, follow these steps:
Step 1Log in to the appliance using an account with administrator privileges.
Step 2Enter the setup command. The System Configuration Dialog is displayed. Press Enter or the spacebar
to skip to the menu to access advanced setup.
Step 3Enter 3 to access advanced setup.
Step 4Specify the Telnet server status. The default is disabled.
Step 5Specify the SSHv1 fallback setting. The default is enabled.
Step 6Specify the web server port. The web server port is the TCP port used by the web server (1 to 65535).
The default is 443.
Advanced Setup
NoteThe web server is configured to use TLS/SSL encryption by default. Setting the port to 80 does
not disable the encryption.
Step 7Enter yes to modify the interface and virtual sensor configuration and to see the current interface
Step 8Enter 1 to edit the interface configuration.
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
3-9
Advanced Setup
Step 9Enter 2 to add inline VLAN pairs and display the list of available interfaces.
CautionThe new VLAN pair is not automatically added to a virtual sensor.
Chapter 3 Initializing the Sensor
NoteThe following options let you create and delete interfaces. You assign the interfaces to virtual
sensors in the virtual sensor configuration. If you are using promiscuous mode for your
interfaces and are not subdividing them by VLAN, no additional configuration is necessary.
Step 25Enter yes if you want to modify the default threat prevention settings.
NoteThe sensor comes with a built-in override to add the deny packet event action to high risk rating
alerts. If you do not want this protection, disable automatic threat prevention.
Virtual sensor newVs is configured to prevent high risk threats in inline mode. (Risk
Rating 90-100)
Virtual sensor vs0 is configured to prevent high risk threats in inline mode.(Risk Rating
90-100)
Do you want to disable automatic threat prevention on all virtual sensors?[no]:
Step 26Enter yes to disable automatic threat prevention on all virtual sensors.
Step 27Press Enter to exit the interface and virtual sensor configuration.
The following configuration was entered.
service host
network-settings
host-ip 192.168.1.2/24,192.168.1.1
host-name sensor
telnet-option disabled
sshv1-fallback enabled
ftp-timeout 300
no login-banner-text
exit
time-zone-settings
offset 0
standard-time-zone-name UTC
exit
summertime-option disabled
ntp-option disabled
exit
service web-server
port 342
exit
service interface
physical-interfaces GigabitEthernet0/0
3-12
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Chapter 3 Initializing the Sensor
admin-state enabled
subinterface-type inline-vlan-pair
subinterface 1
description Created via setup by user asmith
vlan1 200
vlan2 300
exit
exit
exit
physical-interfaces GigabitEthernet0/1
admin-state enabled
exit
physical-interfaces GigabitEthernet0/2
admin-state enabled
exit
physical-interfaces GigabitEthernet0/0
admin-state enabled
exit
inline-interfaces newPair
description Created via setup by user asmith
interface1 GigabitEthernet0/1
interface2 GigabitEthernet0/2
exit
exit
service analysis-engine
virtual-sensor newVs
description Created via setup by user cisco
signature-definition newSig
event-action-rules rules0
anomaly-detection
anomaly-detection-name ad0
operational-mode inactive
exit
physical-interface GigabitEthernet0/0
exit
virtual-sensor vs0
physical-interface GigabitEthernet0/0 subinterface-number 1
logical-interface newPair
service event-action-rules rules0
overrides deny-packet-inline
override-item-status Disabled
risk-rating-range 90-100
exit
exit
Advanced Setup
OL-19892-01
[0] Go to the command prompt without saving this config.
[1] Return back to the setup without saving this config.
[2] Save this configuration and exit setup.
Step 28Enter 2 to save the configuration.
Enter your selection[2]: 2
Configuration Saved.
Step 29Reboot the appliance.
sensor# reset
Warning: Executing this command will stop all applications and reboot the node.
Continue with reset? []:
Step 30Enter yes to continue the reboot.
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
3-13
Advanced Setup
Step 31Apply the most recent service pack and signature update. You are now ready to configure your appliance
for intrusion prevention.
For More Information
For the procedure for obtaining the most recent IPS software, see Obtaining Cisco IPS Software,
page 21-1.
Advanced Setup for the ASA 5500 AIP SSM
To continue with advanced setup for the ASA 5500 AIP SSM, follow these steps:
Step 1Session in to the ASA 5500 AIP SSM using an account with administrator privileges.
asa# session 1
Step 2Enter the setup command. The System Configuration Dialog is displayed. Press Enter or the spacebar
to skip to the menu to access advanced setup.
Chapter 3 Initializing the Sensor
Step 3Enter 3 to access advanced setup.
Step 4Specify the Telnet server status. You can disable or enable Telnet services. The default is disabled.
Step 5Specify the SSHv1 fallback setting. The default is enabled.
Step 6Specify the web server port. The web server port is the TCP port used by the web server (1 to 65535).
The default is 443.
NoteThe web server is configured to use TLS/SSL encryption by default. Setting the port to 80 does
not disable the encryption.
Step 7Enter yes to modify the interface and virtual sensor configuration.
Current interface configuration
Command control: Management0/0
Unassigned:
Monitored:
GigabitEthernet0/1
Step 8Enter 1 to edit the interface configuration.
NoteYou do not need to configure interfaces on the ASA 5500 AIP SSM. You should ignore the
modify interface default VLAN setting. The separation of traffic across virtual sensors is
configured differently for the ASA 5500 AIP SSM than for other sensors.
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Chapter 3 Initializing the Sensor
[1] Modify interface default-vlan.
Option:
Step 9Press Enter to return to the top-level interface and virtual sensor configuration menu.
Step 12Enter 1 to add GigabitEthernet 0/1 to virtual sensor vs0.
NoteMultiple virtual sensors are supported. The adaptive security appliance can direct packets to
specific virtual sensors or can send packets to be monitored by a default virtual sensor. The
default virtual sensor is the virtual sensor to which you assign GigabitEthernet 0/1. We
recommend that you assign GigabitEthernet 0/1 to vs0, but you can assign it to another virtual
sensor if you want to.
Step 13Press Enter to return to the main virtual sensor menu.
Step 14Enter 3 to create a virtual sensor.
Name[]:
Step 15Enter a name and description for your virtual sensor.
Name[]: newVs
Description[Created via setup by user cisco]: New Sensor
Anomaly Detection Configuration
[1] ad0
[2] Create a new anomaly detection configuration
Option[2]:
Step 16Enter 1 to use the existing anomaly detection configuration, ad0.
Signature Definition Configuration
[1] sig0
[2] Create a new signature definition configuration
Option[2]:
OL-19892-01
Step 17Enter 2 to create a signature-definition configuration file.
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
3-15
Advanced Setup
Step 18Enter the signature-definition configuration name, newSig.
Step 19Enter 1 to use the existing event-action-rules configuration, rules0.
Chapter 3 Initializing the Sensor
Event Action Rules Configuration
[1] rules0
[2] Create a new event action rules configuration
Option[2]:
NoteIf GigabitEthernet 0/1 has not been assigned to vs0, you are prompted to assign it to the new
Step 20Press Enter to exit the interface and virtual sensor configuration menu.
Modify default threat prevention settings?[no]:
Step 21Enter yes if you want to modify the default threat prevention settings.
NoteThe sensor comes with a built-in override to add the deny packet event action to high risk rating
alerts. If you do not want this protection, disable automatic threat prevention.
Virtual sensor newVs is configured to prevent high risk threats in inline mode. (Risk
Rating 90-100)
Virtual sensor vs0 is configured to prevent high risk threats in inline mode.(Risk Rating
90-100)
Do you want to disable automatic threat prevention on all virtual sensors?[no]:
Step 22Enter yes to disable automatic threat prevention on all virtual sensors.
The following configuration was entered.
service host
network-settings
host-ip 10.1.9.201/24,10.1.9.1
host-name aip-ssm
telnet-option disabled
sshv1-fallback enabled
access-list 10.0.0.0/8
access-list 64.0.0.0/8
ftp-timeout 300
no login-banner-text
exit
time-zone-settings
offset 0
standard-time-zone-name UTC
exit
summertime-option disabled
3-16
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Chapter 3 Initializing the Sensor
ntp-option disabled
exit
service web-server
port 342
exit
service analysis-engine
virtual-sensor newVs
description New Sensor
signature-definition newSig
event-action-rules rules0
anomaly-detection
anomaly-detection-name ad0
exit
physical-interfaces GigabitEthernet0/1
exit
exit
service event-action-rules rules0
overrides deny-packet-inline
override-item-status Disabled
risk-rating-range 90-100
exit
exit
[0] Go to the command prompt without saving this config.
[1] Return back to the setup without saving this config.
[2] Save this configuration and exit setup.
Advanced Setup
Step 23Enter 2 to save the configuration.
Enter your selection[2]: 2
Configuration Saved.
Step 24Reboot the ASA 5500 AIP SSM.
aip-ssm# reset
Warning: Executing this command will stop all applications and reboot the node.
Continue with reset? []:
Step 25Enter yes to continue the reboot.
Step 26After reboot, log in to the sensor, and display the self-signed X.509 certificate (needed by TLS).
aip-ssm# show tls fingerprint
MD5: C4:BC:F2:92:C2:E2:4D:EB:92:0F:E4:86:53:6A:C6:01
SHA1: 64:9B:AC:DE:21:62:0C:D3:57:2E:9B:E5:3D:04:8F:A7:FD:CD:6F:27
Step 27Write down the certificate fingerprints. You need the fingerprints to check the authenticity of the
certificate when using HTTPS to connect to this ASA 5500 AIP SSM with a web browser.
Step 28Apply the most recent service pack and signature update. You are now ready to configure your
ASA 5500 AIP SSM for intrusion prevention.
For More Information
For the procedure for obtaining the most recent IPS software, see Obtaining Cisco IPS Software,
page 21-1.
OL-19892-01
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
3-17
Advanced Setup
Advanced Setup for the ASA 5500-X IPS SSP
To continue with advanced setup for the ASA 5500-X IPS SSP, follow these steps:
Step 1Session in to the IPS using an account with administrator privileges.
asa# session ips
Step 2Enter the setup command. The System Configuration Dialog is displayed. Press Enter or the spacebar
to skip to the menu to access advanced setup.
Step 3Enter 3 to access advanced setup.
Step 4Specify the Telnet server status. You can disable or enable Telnet services. The default is disabled.
Step 5Specify the SSHv1 fallback setting. The default is enabled.
Step 6Specify the web server port. The web server port is the TCP port used by the web server (1 to 65535).
The default is 443.
NoteThe web server is configured to use TLS/SSL encryption by default. Setting the port to 80 does
not disable the encryption.
Chapter 3 Initializing the Sensor
Step 7Enter yes to modify the interface and virtual sensor configuration.
Current interface configuration
Command control: Management0/0
Unassigned:
Monitored:
PortChannel 0/0
Step 8Enter 1 to edit the interface configuration.
NoteYou do not need to configure interfaces on the ASA 5500-X IPS SSP. You should ignore the
modify interface default VLAN setting. The separation of traffic across virtual sensors is
configured differently for the ASA 5500-X IPS SSP than for other sensors.
[1] Modify interface default-vlan.
Option:
3-18
Step 9Press Enter to return to the top-level interface and virtual sensor configuration menu.
Step 12Enter 1 to add PortChannel 0/0 to virtual sensor vs0.
Advanced Setup
NoteMultiple virtual sensors are supported. The adaptive security appliance can direct packets to
specific virtual sensors or can send packets to be monitored by a default virtual sensor. The
default virtual sensor is the virtual sensor to which you assign PortChannel 0/0. We recommend
that you assign PortChannel 0/0 to vs0, but you can assign it to another virtual sensor if you want
to.
Step 13Press Enter to return to the main virtual sensor menu.
Step 14Enter 3 to create a virtual sensor.
Name[]:
Step 15Enter a name and description for your virtual sensor.
Name[]: newVs
Description[Created via setup by user cisco]: New Sensor
Anomaly Detection Configuration
[1] ad0
[2] Create a new anomaly detection configuration
Option[2]:
Step 16Enter 1 to use the existing anomaly-detection configuration, ad0.
Signature Definition Configuration
[1] sig0
[2] Create a new signature definition configuration
Option[2]:
Step 17Enter 2 to create a signature-definition configuration file.
Step 18Enter the signature-definition configuration name, newSig.
Event Action Rules Configuration
[1] rules0
[2] Create a new event action rules configuration
Option[2]:
OL-19892-01
Step 19Enter 1 to use the existing event-action-rules configuration, rules0.
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
3-19
Advanced Setup
Step 20Press Enter to exit the interface and virtual sensor configuration menu.
Step 21Enter yes if you want to modify the default threat prevention settings.
Chapter 3 Initializing the Sensor
NoteIf PortChannel 0/0 has not been assigned to vs0, you are prompted to assign it to the new virtual
NoteThe sensor comes with a built-in override to add the deny packet event action to high risk rating
alerts. If you do not want this protection, disable automatic threat prevention.
Virtual sensor newVs is configured to prevent high risk threats in inline mode. (Risk
Rating 90-100)
Virtual sensor vs0 is configured to prevent high risk threats in inline mode.(Risk Rating
90-100)
Do you want to disable automatic threat prevention on all virtual sensors?[no]:
Step 22Enter yes to disable automatic threat prevention on all virtual sensors.
The following configuration was entered.
service host
network-settings
host-ip 192.168.1.2/24,192.168.1.1
host-name asa-ips
telnet-option disabled
sshv1-fallback enabled
access-list 10.0.0.0/8
access-list 64.0.0.0/8
ftp-timeout 300
no login-banner-text
exit
time-zone-settings
offset 0
standard-time-zone-name UTC
exit
summertime-option disabled
ntp-option disabled
exit
service web-server
port 342
exit
service analysis-engine
virtual-sensor newVs
description New Sensor
3-20
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
[0] Go to the command prompt without saving this config.
[1] Return back to the setup without saving this config.
[2] Save this configuration and exit setup.
Step 23Enter 2 to save the configuration.
Enter your selection[2]: 2
Configuration Saved.
Advanced Setup
Step 24Reboot the ASA 5500-X IPS SSP.
asa-ips# reset
Warning: Executing this command will stop all applications and reboot the node.
Continue with reset? []:
Step 25Enter yes to continue the reboot.
Step 26After reboot, log in to the sensor, and display the self-signed X.509 certificate (needed by TLS).
asa-ips# show tls fingerprint
MD5: C4:BC:F2:92:C2:E2:4D:EB:92:0F:E4:86:53:6A:C6:01
SHA1: 64:9B:AC:DE:21:62:0C:D3:57:2E:9B:E5:3D:04:8F:A7:FD:CD:6F:27
Step 27Write down the certificate fingerprints. You need the fingerprints to check the authenticity of the
certificate when using HTTPS to connect to this ASA 5500-X IPS SSP with a web browser.
Step 28Apply the most recent service pack and signature update. You are now ready to configure the
ASA 5500-X IPS SSP for intrusion prevention.
For More Information
For the procedure for obtaining the most recent IPS software, see Obtaining Cisco IPS Software,
page 21-1.
Advanced Setup for the ASA 5585-X IPS SSP
OL-19892-01
To continue with advanced setup for the ASA 5585-X IPS SSP, follow these steps:
Step 1Session in to the ASA 5585-X IPS SSP using an account with administrator privileges.
asa# session 1
Step 2Enter the setup command. The System Configuration Dialog is displayed. Press Enter or the spacebar
to skip to the menu to access advanced setup.
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
3-21
Advanced Setup
Step 3Enter 3 to access advanced setup.
Step 4Specify the Telnet server status. You can disable or enable Telnet services. The default is disabled.
Step 5Specify the SSHv1 fallback setting. The default is enabled.
Step 6Specify the web server port. The web server port is the TCP port used by the web server (1 to 65535).
Step 7Enter yes to modify the interface and virtual sensor configuration.
Chapter 3 Initializing the Sensor
The default is 443.
NoteThe web server is configured to use TLS/SSL encryption by default. Setting the port to 80 does
not disable the encryption.
Current interface configuration
Command control: Management0/0
Unassigned:
Monitored:
PortChannel0/0
Step 8Enter 1 to edit the interface configuration.
NoteYou do not need to configure interfaces on the ASA 5585-X IPS SSP. You should ignore the
modify interface default VLAN setting. The separation of traffic across virtual sensors is
configured differently for the ASA 5585-X IPS SSP than for other sensors.
[1] Modify interface default-vlan.
Option:
Step 9Press Enter to return to the top-level interface and virtual sensor configuration menu.
Step 12Enter 1 to add PortChannel 0/0 to virtual sensor vs0.
NoteMultiple virtual sensors are supported. The adaptive security appliance can direct packets to
Step 13Press Enter to return to the main virtual sensor menu.
Step 14Enter 3 to create a virtual sensor.
Name[]:
Step 15Enter a name and description for your virtual sensor.
Name[]: newVs
Description[Created via setup by user cisco]: New Sensor
Anomaly Detection Configuration
[1] ad0
[2] Create a new anomaly detection configuration
Option[2]:
Advanced Setup
specific virtual sensors or can send packets to be monitored by a default virtual sensor. The
default virtual sensor is the virtual sensor to which you assign PortChannel 0/0. We recommend
that you assign PortChannel 0/0 to vs0, but you can assign it to another virtual sensor if you want
to.
Step 16Enter 1 to use the existing anomaly-detection configuration, ad0.
Signature Definition Configuration
[1] sig0
[2] Create a new signature definition configuration
Option[2]:
Step 17Enter 2 to create a signature-definition configuration file.
Step 18Enter the signature-definition configuration name, newSig.
Event Action Rules Configuration
[1] rules0
[2] Create a new event action rules configuration
Option[2]:
Step 19Enter 1 to use the existing event action rules configuration, rules0.
NoteIf PortChannel 0/0 has not been assigned to vs0, you are prompted to assign it to the new virtual
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
3-23
Advanced Setup
Step 20Press Enter to exit the interface and virtual sensor configuration menu.
Step 21Enter yes if you want to modify the default threat prevention settings.
Step 22Enter yes to disable automatic threat prevention on all virtual sensors.
Chapter 3 Initializing the Sensor
[4] Create new virtual sensor.
Option:
Modify default threat prevention settings?[no]:
NoteThe sensor comes with a built-in override to add the deny packet event action to high risk rating
alerts. If you do not want this protection, disable automatic threat prevention.
Virtual sensor newVs is configured to prevent high risk threats in inline mode. (Risk
Rating 90-100)
Virtual sensor vs0 is configured to prevent high risk threats in inline mode.(Risk Rating
90-100)
Do you want to disable automatic threat prevention on all virtual sensors?[no]:
The following configuration was entered.
service host
network-settings
host-ip 10.1.9.201/24,10.1.9.1
host-name ips-ssm
telnet-option disabled
sshv1-fallback enabled
access-list 10.0.0.0/8
access-list 64.0.0.0/8
ftp-timeout 300
no login-banner-text
exit
time-zone-settings
offset 0
standard-time-zone-name UTC
exit
summertime-option disabled
ntp-option disabled
exit
service web-server
port 342
exit
service analysis-engine
virtual-sensor newVs
description New Sensor
signature-definition newSig
event-action-rules rules0
anomaly-detection
anomaly-detection-name ad0
exit
physical-interfaces PortChannel0/0
exit
exit
service event-action-rules rules0
overrides deny-packet-inline
override-item-status Disabled
risk-rating-range 90-100
exit
exit
3-24
[0] Go to the command prompt without saving this config.
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Chapter 3 Initializing the Sensor
[1] Return back to the setup without saving this config.
[2] Save this configuration and exit setup.
Step 23Enter 2 to save the configuration.
Enter your selection[2]: 2
Configuration Saved.
Step 24Reboot the ASA 5585-X IPS SSP.
ips-ssp# reset
Warning: Executing this command will stop all applications and reboot the node.
Continue with reset? []:
Step 25Enter yes to continue the reboot.
Step 26After reboot, log in to the sensor, and display the self-signed X.509 certificate (needed by TLS).
ips-ssp# show tls fingerprint
MD5: C4:BC:F2:92:C2:E2:4D:EB:92:0F:E4:86:53:6A:C6:01
SHA1: 64:9B:AC:DE:21:62:0C:D3:57:2E:9B:E5:3D:04:8F:A7:FD:CD:6F:27
Step 27Write down the certificate fingerprints. You need the fingerprints to check the authenticity of the
certificate when using HTTPS to connect to this ASA 5585-X IPS SSP with a web browser.
Step 28Apply the most recent service pack and signature update. You are now ready to configure your
ASA 5585-X IPS SSP for intrusion prevention.
Verifying Initialization
For More Information
For the procedure for obtaining the most recent IPS software, see Obtaining Cisco IPS Software,
page 21-1.
Verifying Initialization
NoteThe CLI output is an example of what your configuration may look like. It will not match exactly due to
the optional setup choices, sensor model, and IPS 7.1 version you have installed.
To verify that you initialized your sensor, follow these steps:
Step 1Log in to the sensor.
Step 2View your configuration.
sensor# show configuration
! -----------------------------! Current configuration last modified Tue Nov 01 10:40:39 2011
! -----------------------------! Version 7.1(3)
! Host:
! Realm Keys key1.0
! Signature Definition:
! Signature Update S581.0 2011-07-11
! -----------------------------service interface
exit
! ------------------------------
OL-19892-01
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
NoteYou can also use the more current-config command to view your configuration.
Step 3Display the self-signed X.509 certificate (needed by TLS).
sensor# show tls fingerprint
MD5: C4:BC:F2:92:C2:E2:4D:EB:92:0F:E4:86:53:6A:C6:01
SHA1: 64:9B:AC:DE:21:62:0C:D3:57:2E:9B:E5:3D:04:8F:A7:FD:CD:6F:27
Step 4Write down the certificate fingerprints. You need the fingerprints to check the authenticity of the
certificate when connecting to this sensor with a web browser.
For More Information
For the procedure for logging in to the sensor, see Chapter 2, “Logging In to the Sensor.”
OL-19892-01
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
3-27
Verifying Initialization
Chapter 3 Initializing the Sensor
3-28
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
CHA P T ER
4
Setting Up the Sensor
This chapter contains procedures for the setting up the sensor, and contains the following sections:
• Setup Notes and Caveats, page 4-1
• Understanding Sensor Setup, page 4-2
• Changing Network Settings, page 4-2
• Changing the CLI Session Timeout, page 4-13
• Changing Web Server Settings, page 4-14
• Configuring Authentication and User Parameters, page 4-16
• Configuring Time, page 4-34
• Configuring SSH, page 4-44
• Configuring TLS, page 4-50
• Installing the License Key, page 4-56
Setup Notes and Caveats
The following notes and caveats apply to setting up the sensor:
• By default SSHv1 fallback is enabled.
• When updating the hostname, the CLI prompt of the current session and other existing sessions is
not updated with the new hostname immediately. Subsequent CLI login sessions reflect the new
hostname in the prompt.
• Telnet is not a secure access service and therefore is disabled by default on the sensor. However,
SSH is always running on the sensor and it is a secure service.
• For global correlation to function, you must have either a DNS server or an HTTP proxy server
configured at all times.
• DNS resolution is supported only for accessing the global correlation update server.
• The default web server port is 443 if TLS is enabled and 80 if TLS is disabled.
• The username command provides username and password authentication for login purposes only.
You cannot use this command to remove a user who is logged in to the system. You cannot use this
command to remove yourself from the system.
OL-19892-01
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
4-1
Understanding Sensor Setup
• You cannot use the privilege command to give a user service privileges. If you want to give an
• Do not make modifications to the sensor through the service account except under the direction of
• You should carefully consider whether you want to create a service account. The service account
• Administrators may need to disable the password recovery feature for security reasons.
• We recommend that you use an NTP server to regulate time on your sensor. You can use
• In addition to a valid Cisco.com username and password, you must also have a Cisco Services for
Chapter 4 Setting Up the Sensor
existing user service privileges, you must remove that user and then use the username command to
create the service account.
TAC. If you use the service account to configure the sensor, your configuration is not supported by
TAC. Adding services to the operating system through the service account affects proper
performance and functioning of the other IPS services. TAC does not support a sensor on which
additional services have been added.
provides shell access to the system, which makes the system vulnerable. However, you can use the
service account to create a password if the administrator password is lost. Analyze your situation to
decide if you want a service account existing on the system.
authenticated or unauthenticated NTP. For authenticated NTP, you must obtain the NTP server IP
address, NTP server key ID, and the key value from the NTP server. You can set up NTP during
initialization or you can configure NTP through the CLI, IDM, IME, or ASDM.
IPS service contract before you can apply for a license key.
Understanding Sensor Setup
Setting up the sensor involves such tasks as changing sensor initialization information, adding and
deleting users, configuring time and setting up NTP, creating a service account, configuring SSH and
TLS, and installing the license key. You configured most of these settings when you initialized the sensor
using the setup command.
For More Information
For more information on using the setup command to initialize the sensor, see Chapter 3, “Initializing
the Sensor.”
Changing Network Settings
After you initialize your sensor, you may need to change some of the network settings that you
configured when you ran the setup command. This section describes how to change network settings,
and contains the following topics:
• Changing the Hostname, page 4-3
• Changing the IP Address, Netmask, and Gateway, page 4-4
• Enabling and Disabling Telnet, page 4-5
• Changing the Access List, page 4-6
• Changing the FTP Timeout, page 4-8
• Adding a Login Banner, page 4-9
• Configuring the DNS and Proxy Servers for Global Correlation, page 4-10
4-2
• Enabling SSHv1 Fallback, page 4-12
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Chapter 4 Setting Up the Sensor
Changing the Hostname
NoteThe CLI prompt of the current session and other existing sessions will not be updated with the new
hostname. Subsequent CLI login sessions will reflect the new hostname in the prompt.
Use the host-name host_name command in the service host submode to change the hostname of the
sensor after you have run the setup command. The default is sensor. To change the sensor hostname,
follow these steps:
Step 1Log in to the sensor using an account with administrator privileges.
Step 2Enter network settings submode.
sensor# configure terminal
sensor(config)# service host
sensor(config-hos)# network-settings
Step 3Change the sensor hostname.
sensor(config-hos-net)# host-name firesafe
Changing Network Settings
Step 4Verify the new hostname.
sensor(config-hos-net)# show settings
network-settings
Step 8Press Enter to apply the changes or enter no to discard them.
Changing the IP Address, Netmask, and Gateway
Use the host-ip ip_address/netmask,default_gateway command in the service host submode to change
the IP address, netmask, and default gateway after you have run the setup command. The default is
192.168.1.2/24,192.168.1.1.
The host-ip is in the form of IP Address/Netmask/Gateway: X.X.X.X/nn,Y.Y.Y.Y, where X.X.X.X
specifies the sensor IP address as a 32-bit address written as 4 octets separated by periods where X =
0-255, nn specifies the number of bits in the netmask, and Y.Y.Y.Y specifies the default gateway as a
32-bit address written as 4 octets separated by periods where Y = 0-255.
To change the sensor IP address, netmask, and default gateway, follow these steps:
Chapter 4 Setting Up the Sensor
Step 1Log in to the sensor using an account with administrator privileges.
Step 2Enter network settings mode.
sensor# configure terminal
sensor(config)# service host
sensor(config-hos)# network-settings
Step 3Change the sensor IP address, netmask, and default gateway.
Step 8Press Enter to apply the changes or enter no to discard them.
Enabling and Disabling Telnet
CautionTelnet is not a secure access service and therefore is disabled by default. However, SSH is always
running on the sensor and it is a secure service.
Use the telnet-option {enabled | disabled} command in the service host submode to enable Telnet for
remote access to the sensor. The default is disabled. To enable or disable Telnet services, follow these
steps:
Step 1Log in to the sensor using an account with administrator privileges.
Step 2Enter network settings mode.
sensor# configure terminal
sensor(config)# service host
sensor(config-hos)# network-settings
Step 6Press Enter to apply the changes or enter no to discard them.
Chapter 4 Setting Up the Sensor
NoteTo Telnet to the sensor, you must enable Telnet and configure the access list to allow the Telnet clients
to connect.
For More Information
For the procedure for configuring the access list, see Changing the Access List, page 4-6.
Changing the Access List
Use the access-list ip_address/netmask command in the service host submode to configure the access
list, the list of hosts or networks that you want to have access to your sensor. Use the no form of the
command to remove an entry from the list. The default access list is empty.
The following hosts must have an entry in the access list:
• Hosts that need to Telnet to your sensor.
• Hosts that need to use SSH with your sensor.
• Hosts, such as the IDM and the IME, that need to access your sensor from a web browser.
• Management stations, such as the CSM, that need access to your sensor.
• If your sensor is a master blocking sensor, the IP addresses of the blocking forwarding sensors must
have an entry in the list.
To modify the access list, follow these steps:
4-6
Step 1Log in to the sensor using an account with administrator privileges.
Step 2Enter network settings mode.
sensor# configure terminal
sensor(config)# service host
sensor(config-hos)# network-settings
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Chapter 4 Setting Up the Sensor
Step 3Add an entry to the access list. The netmask for a single host is 32.
Step 10Press Enter to apply the changes or enter no to discard them.
Changing the FTP Timeout
NoteYou can use the FTP client for downloading updates and configuration files from your FTP server.
Use the ftp-timeout command in the service host submode to change the number of seconds that the FTP
client waits before timing out when the sensor is communicating with an FTP server. The default is 300
seconds. To change the FTP timeout, follow these steps:
Chapter 4 Setting Up the Sensor
Step 1Log in to the sensor using an account with administrator privileges.
Step 2Enter network settings mode.
sensor# configure terminal
sensor(config)# service host
sensor(config-hos)# network-settings
Step 3Change the number of seconds of the FTP timeout.
sensor(config-hos-net)# ftp-timeout 500
Step 4Verify the FTP timeout change.
sensor(config-hos-net)# show settings
network-settings
Step 8Press Enter to apply the changes or enter no to discard them.
Changing Network Settings
Adding a Login Banner
Use the login-banner-text text_message command to add a login banner that the user sees during login.
There is no default. When you want to start a new line in your message, press Ctrl-V Enter.
To add a login banner, follow these steps:
Step 1Log in to the sensor using an account with administrator privileges.
Step 2Enter network settings mode.
sensor# configure terminal
sensor(config)# service host
sensor(config-hos)# network-settings
Step 3Add the banner login text.
sensor(config-hos-net)# login-banner-text This is the banner login text message.
Step 4Verify the banner login text message.
sensor(config-hos-net)# show settings
network-settings
---------------------------------------------- ftp-timeout: 300 seconds <defaulted>
login-banner-text: This is the banner login text message. default:
Step 8Press Enter to apply the changes or enter no to discard them.
Configuring the DNS and Proxy Servers for Global Correlation
Use the http-proxy, dns-primary-server, dns-secondary-server, and dns-tertiary-server commands
in network-settings submode to configure servers to support the global correlation features.
You must configure either an HTTP proxy server or DNS server to support global correlation. You may
need a proxy server to download global correlation updates if you use proxy in your network. If you are
using a DNS server, you must configure at least one DNS server and it must be reachable for global
correlation updates to be successful. You can configure other DNS servers as backup servers. DNS
queries are sent to the first server in the list. If it is unreachable, DNS queries are sent to the next
configured DNS server.
CautionFor global correlation to function, you must have either a DNS server or an HTTP proxy server
configured at all times.
CautionDNS resolution is supported only for accessing the global correlation update server.
The following options apply:
4-10
• http-proxy {no-proxy | proxy-sensor}—Configures the HTTP proxy server:
–
address ip_address —Specifies the IP address of the HTTP proxy server.
–
port port_number —Specifies the port number of the HTTP proxy server.
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Chapter 4 Setting Up the Sensor
• dns-primary-server {enabled | disabled}—Enables a DNS primary server:
• dns-secondary-server {enabled | disabled}—Enables a DNS secondary server:
• dns-tertiary-server {enabled | disabled}—Enables the DNS tertiary server:
Configuring DNS and Proxy Servers for Global Correlation
To configure DNS and proxy servers to support global correlation, follow these steps:
Step 1Log in to the sensor using an account with administrator privileges.
Step 2Enter network settings submode.
sensor# configure terminal
sensor(config)# service host
sensor(config-hos)# network-settings
Step 3Enable a proxy or DNS server to support global correlation:
Changing Network Settings
–
address ip_address —Specifies the IP address of the DNS primary server.
–
address ip_address —Specifies the IP address of the DNS secondary server.
–
address ip_address —Specifies the IP address of the DNS tertiary server.
a. Enable a proxy server.
sensor(config-hos-net)# http-proxy proxy-server
sensor(config-hos-net-pro)# address 10.10.10.1
sensor(config-hos-net-pro)# port 65
sensor(config-hos-net-pro)#
Step 6Press Enter to apply the changes or enter no to discard them.
For More Information
For more information on global correlation features, see Chapter 10, “Configuring Global Correlation.”
Enabling SSHv1 Fallback
NoteThe IPS supports a management connection through both SSHv1 and SSHv2 (SSHv2 is supported in
IPS 7.1(8)E4). In 7.1(8)E4 and later, support for both SSHv1 and SSHv2 is enabled by default.
Use the sshv1-fallback {enabled | disabled} command in the service host submode to enable/disable
the sensor to fall back to SSH protocol version 1. Fallback to SSHv1 is provided in case the peer
client/server does not support SSHv2.
To enable or disable SSHv1 fallback, follow these steps:
Step 1Log in to the sensor using an account with administrator privileges.
Step 2Enter network settings mode.
sensor# configure terminal
sensor(config)# service host
sensor(config-hos)# network-settings
Step 6Press Enter to apply the changes or enter no to discard them.
Changing the CLI Session Timeout
Changing the CLI Session Timeout
Use the cli-inactivity-timeout command in the service authentication submode to change the number of
seconds that the CLI waits before timing out. Setting the CLI session timeout increases the security of a
CLI session. The default is 0 seconds, which means that it is an unlimited value and thus will never time
out. The valid range is 0 to 100,000 minutes. This command is supported in IPS 7.1(3)E4 and later.
To change the CLI session timeout, follow these steps:
Step 1Log in to the sensor using an account with administrator privileges.
Step 2Enter authentication mode.
sensor# configure terminal
sensor(config)# service authentication
Step 3Change the number of seconds of the CLI session timeout.
sensor(config-aut)# cli-inactivity-timeout 5000
Step 4Verify the CLI session timeout change.
sensor(config-aut)# show settings
attemptLimit: 0 <defaulted>
password-strength
Step 8Press Enter to apply the changes or enter no to discard them.
Changing Web Server Settings
NoteThe default web server port is 443 if TLS is enabled and 80 if TLS is disabled.
After you run the setup command, you can change the following web server settings: the web server port,
whether TLS encryption is being used, and the HTTP server header message.
HTTP is the protocol that web clients use to make requests from web servers. The HTTP specification
requires a server to identify itself in each response. Attackers sometimes exploit this protocol feature to
perform reconnaissance. If the IPS web server identified itself by providing a predictable response, an
attacker might learn that an IPS sensor is present.
We recommend that you not reveal to attackers that you have an IPS sensor. Change the server-id to
anything that does not reveal any information, especially if your web server is available to the Internet.
For example, if you forward a port through a firewall so you can monitor a sensor remotely, you need to
set the server-id.
To change the web server settings, follow these steps:
4-14
Step 1Log in to the sensor using an account with administrator privileges.
Step 2Enter web server mode.
sensor# configure terminal
sensor(config)# service web-server
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Chapter 4 Setting Up the Sensor
Step 3Change the port number.
sensor(config-web)# port 8080
If you change the port number from the default of 443 to 8080, you receive this message:
Warning: The web server’s listening port number has changed from 443 to 8080. This change
will not take effect until the web server is re-started
Step 4Enable or disable TLS.
sensor(config-web)# enable-tls {true | false}
If you disable TLS, you receive this message:
Warning: TLS protocol support has been disabled. This change will not take effect until
the web server is re-started.
Step 5Change the HTTP server header.
sensor(config-web)# server-id Nothing to see here. Move along.
Step 6Verify the web server changes.
sensor(config-web)# show settings
enable-tls: true default: true
port: 8001 default: 443
server-id: Nothing to see here. Move along. default: HTTP/1.1 compliant
sensor(config-web)#
Changing Web Server Settings
Step 7To revert to the defaults, use the default form of the commands.
sensor(config-web)# default port
sensor(config-web)# default enable-tls
sensor(config-web)# default server-id
Step 10Press Enter to apply the changes or enter no to discard them.
OL-19892-01
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
4-15
Configuring Authentication and User Parameters
NoteIf you change the port or enable TLS settings, you must reset the sensor to make the web server use the
new settings.
For More Information
• For the procedure for resetting the appliance, see Resetting the Appliance, page 17-47.
• For the procedure for resetting the ASA 5500 AIP SSM, see Reloading, Shutting Down, Resetting,
and Recovering the ASA 5500 AIP SSM, page 18-15.
• For the procedure for resetting the ASA 5500-X IPS SSP, see Reloading, Shutting Down, Resetting,
and Recovering the ASA 5500-X IPS SSP, page 19-12.
• For the procedure for resetting the ASA 5585-X IPS SSP, see Reloading, Shutting Down, Resetting,
and Recovering the ASA 5585-X IPS SSP, page 20-12.
Configuring Authentication and User Parameters
Chapter 4 Setting Up the Sensor
The following section explains how to create users, configure RADIUS authentication, create the service
account, configure passwords, specify privilege level, view a list of users, configure password policy,
and lock and unlock user accounts. It contains the following topics:
• The Service Account and RADIUS Authentication, page 4-27
• RADIUS Authentication Functionality and Limitations, page 4-28
• Configuring Passwords, page 4-28
• Changing User Privilege Levels, page 4-29
• Showing User Status, page 4-30
• Configuring the Password Policy, page 4-30
• Locking User Accounts, page 4-32
• Unlocking User Accounts, page 4-33
Adding and Removing Users
4-16
Use the username command to create users on the local system. You can add a new user, set the privilege
level—administrator, operator, viewer—and set the password for the new user. Use the no form of this
command to remove a user from the system. This removes the user from CLI and web access.
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Chapter 4 Setting Up the Sensor
CautionThe username command provides username and password authentication for login purposes only. You
cannot use this command to remove a user who is logged in to the system. You cannot use this command
to remove yourself from the system.
If you do not specify a password, the system prompts you for one. Use the password command to change
the password for existing users. Use the privilege command to change the privilege for existing users.
The username follows the pattern ^[A-Za-z0-9()+:,_/-]+$, which means the username must start with a
letter or number, and can include any letter A to Z (capital or small), any number 0 to 9, - and _, and can
contain 1 to 64 characters. A valid password is 8 to 32 characters long. All characters except space are
allowed.
You receive the following error messages if you do not create a valid password:
• Error: setEnableAuthenticationTokenStatus : The password is too short.
• Error: setEnableAuthenticationTokenStatus : Failure setting the account’s password:
it does not contain enough DIFFERENT characters
NoteYou cannot use the privilege command to give a user service privileges. If you want to give an existing
user service privileges, you must remove that user and then use the username command to create the
service account.
Configuring Authentication and User Parameters
To add and remove users, follow these steps:
Step 1Log in to the CLI using an account with administrator privileges.
Step 5To remove a user, use the no form of the command.
sensor# configure terminal
sensor(config)# no username jsmith
NoteYou cannot use this command to remove yourself from the system.
Step 6Verify that the user has been removed. The user jsmith has been removed.
sensor(config)# exit
sensor# show users all
CLI ID User Privilege
* 13491 cisco administrator
jtaylor service
jroberts viewer
sensor#
Chapter 4 Setting Up the Sensor
For More Information
• For the procedure for creating the service account, see Creating the Service Account, page 4-26.
• For the procedure for configuring local or RADIUS authentication, see Configuring Authentication,
page 4-18.
Configuring Authentication
CautionMake sure you have a RADIUS server already configured before you configure RADIUS authentication
on the sensor. IPS has been tested with CiscoSecure ACS 4.2 and 5.1 servers. Refer to your RADIUS
server documentation for information on how to set up a RADIUS server.
You can create and remove users from the local sensor. You can only modify one user account at a time.
Each user is associated with a role that controls what that user can and cannot modify. The requirements
that must be used for user passwords are set with the password command.
Users are authenticated through AAA either locally or through RADIUS servers. Local authentication
is enabled by default. You must configure RADIUS authentication before it is active.
You must specify the user role that is authenticated through RADIUS either by configuring the user role
on the RADIUS server or specifying a default user role. The username and password are sent in an
authentication request to the configured RADIUS server. The response of the server determines whether
the login is authenticated.
4-18
NoteIf the sensor is not configured to use a default user role and the sensor user role information in not in the
Accept Message of the CiscoSecure ACS server, the sensor rejects RADIUS authentication even if the
CiscoSecure ACS server accepts the username and password.
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Chapter 4 Setting Up the Sensor
You can configure a primary RADIUS server and a secondary RADIUS server. The secondary RADIUS
server authenticates and authorizes users if the primary RADIUS server is unresponsive.
You can also configure the sensor to use local authentication (local fallback) if no RADIUS servers are
responding. In this case, the sensor authenticates against the locally configured user accounts. The
sensor will only use local authentication if the RADIUS servers are not available, not if the RADIUS
server rejects the authentication requests of the user. You can also configure how users connected
through the console port are authenticated—through local user accounts, through RADIUS first and if
that fails through local user accounts, or through RADIUS alone.
To configure a RADIUS server, you must have the IP address, port, and shared secret of the RADIUS
server. You must also either have the NAS-ID of the RADIUS server, or have the RADIUS server
configured to authenticate clients without a NAS-ID or with the default IPS NAS-ID of cisco-ips.
NoteEnabling RADIUS authentication on the sensor does not disconnect already established connections.
RADIUS authentication is only enforced for new connections to the sensor. Existing CLI, IDM, and IME
connections remain established with the login credentials used prior to configuring RADIUS
authentication. To force disconnection of these established connections, you must reset the sensor after
RADIUS is configured.
Configuring Authentication and User Parameters
RADIUS Authentication Options
Use the aaa command in service aaa submode to configure either local authentication or authentication
using a RADIUS server. The following options apply:
• local—Lets you specify local authentication. To continue to create users, use the password
command.
• radius—Lets you specify RADIUS as the method of authentication:
–
nas-id—Identifies the service requesting authentication. The value can be no nas-id, cisco-ips,
or a NAS-ID already configured on the RADIUS server. The default is cisco-ips.
–
default-user-role—Lets you assign a default user role on the sensor that is only applied when
there is NOT a Cisco av pair specifying the user role. The value can be unspecified, viewer, operator, or administrator. Service cannot be the default user role. The default is unspecified.
If you do not want to configure a default user role on the sensor that is applied in the absence
of a Cisco av pair, you need to configure the Cisco IOS/PIX 6.x RADIUS Attributes [009\001]
cisco-av-pair under the group or user profile with one of the following options:
ips-role=viewer, ips-role=operator, ips-role=administrator, ips-role=service, or
ips-role=unspecified. The default is ips-role=unspecified.
NoteIf the sensor is not configured to use a default user role and the sensor user role
information in not in the Accept Message of the CiscoSecure ACS server, the sensor
rejects RADIUS authentication even if the CiscoSecure ACS server accepts the
username and password.
OL-19892-01
NoteThe default user role is used only when the user has not been configured with a specific
role on the ACS server. Local users are always configured with a specific role so the
default user role will never apply to locally authenticated users.
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
4-19
Configuring Authentication and User Parameters
CautionDo not add multiple Cisco av-pairs with the same key. You should have only one instance of
ips-role=value. Make sure the key and the value are correct or the feature may not work as expected. For
example, do not use the following configuration:
ips-role= administer
ips-role=ad
–
local-fallback {enabled | disabled}—Lets you default to local authentication if the RADIUS
servers are not responding. The default is enabled.
• primary-server—Lets you configure the main RADIUS server:
–
server-address—IP address of the RADIUS server.
–
server-port—Port of the RADIUS server. If not specified, the default RADIUS port is used.
–
timeout (seconds)—Specifies the number of seconds the sensor waits for a response from a
RADIUS server before it considers the server to be unresponsive.
–
shared-secret—The secret value configured on the RADIUS server. You must obtain the secret
value of the RADIUS server to enter with the shared-secret command.
Chapter 4 Setting Up the Sensor
NoteYou must have the same secret value configured on both the RADIUS server and the IPS
sensor so that the server can authenticate the requests of the client and the client can
authenticate the responses of the server.
• secondary-server {enabled | disabled}— (Optional) Lets you configure a secondary RADIUS
server:
–
server-address—IP address of the RADIUS server.
–
server-port—Port of the RADIUS server. If not specified, the default RADIUS port is used.
–
timeout (seconds)—Specifies the number of seconds the sensor waits for a response from a
RADIUS server before it considers the server to be unresponsive.
–
shared-secret—The secret value configured on the RADIUS server. You must obtain the secret
value of the RADIUS server to enter with the shared-secret command.
NoteYou must have the same secret value configured on both the RADIUS server and the IPS
sensor so that the server can authenticate the requests of the client and the client can
authenticate the responses of the server.
• console-authentication—Lets you choose how users connected through the console port are
authenticated:
–
local—Users connected through the console port are authenticated through local user accounts.
–
radius-and-local—Users connected through the console port are authenticated through
RADIUS first. If RADIUS fails, local authentication is attempted. This is the default.
–
radius—Users connected through the console port are authenticated by RADIUS. If you also
have local-fallback enabled, users can also be authenticated through the local user accounts.
4-20
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.