[ LiB ] |
Terms you'll need to understand:
setup command
hostname command
reset command
recovery command
Techniques you'll need to master:
Configuring the sensor with the setup command
Recovering the application partition
Manually configuring the IP logging
Using the reset command and its options
Changing a user 's privilege level
Backing up the current-config to an FTP server
Peak performance from your Cisco Secure Intrusion Detection System (IDS) requires sensor configurations that are optimized for your specific network topology and security policy. Understanding the sensor features that you can change and configure means that you thoroughly understand the options available when determining your configuration. This chapter covers the command-line interface (CLI), the steps required in sensor setup, the configuration process, and the practical configuration settings such as sensor identification, host communication, and logging.
[ LiB ] |