Chapter 8. Command-Line Interface Commands

[ LiB ]  

Terms you'll need to understand:

  • setup command

  • hostname command

  • reset command

  • recovery command

Techniques you'll need to master:

  • Configuring the sensor with the setup command

  • Recovering the application partition

  • Manually configuring the IP logging

  • Using the reset command and its options

  • Changing a user 's privilege level

  • Backing up the current-config to an FTP server

Peak performance from your Cisco Secure Intrusion Detection System (IDS) requires sensor configurations that are optimized for your specific network topology and security policy. Understanding the sensor features that you can change and configure means that you thoroughly understand the options available when determining your configuration. This chapter covers the command-line interface (CLI), the steps required in sensor setup, the configuration process, and the practical configuration settings such as sensor identification, host communication, and logging.

[ LiB ]  

CSIDS Exam Cram 2 (Exam 642-531)
CSIDS Exam Cram 2 (Exam 642-531)
Year: 2004
Pages: 213 © 2008-2017.
If you may any questions please contact us: