Cisco Intrusion Prevention System Command Reference for IPS 7.1
Index

Table Of Contents

A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - R - S - T - U - V -

Index

A

adding

an entry to the known hosts table 2-149

a public key 2-146

a trusted host 2-153

administrator privileges 1-1

alerts viewing 2-99

anomaly detection file

loading 2-4

saving 2-5

using 2-5

anomaly-detection load

described 2-4

examples 2-4

syntax 2-4

anomaly-detection name described 2-70

anomaly-detection save

described 2-5

examples 2-5

syntax 2-5

application partition reimaging 2-66

applying

service packs 2-156

signature updates 2-156

attacker IP address removing 2-16

attemptLimit

described 2-6

examples 2-6

related commands 2-7

syntax 2-6

B

banner login

described 2-8

examples 2-8

using 2-8

banner message creating 2-8

block requests viewing 2-99

C

capturing live traffic 2-58

changing the password 2-61

clear denied-attackers

described 2-16

examples 2-16, 2-32

syntax 2-16, 2-31

using 2-16, 2-31

clear events

described 2-18

examples 2-18, 2-106

using 2-18, 2-106

clear line

described 2-19

examples 2-19

syntax 2-19

using 2-19

clear os-identification

described 2-21

examples 2-22

syntax 2-21

using 2-21

CLI

command line editing 1-4

command modes 1-5

default keywords 1-8

error messages A-1

generic commands 1-7

regular expression syntax 1-5

CLI behavior

case sensitivity 1-3

described 1-2

display options 1-4

help 1-3

prompts 1-2

recall 1-3

tab completion 1-3

clock set

described 2-23

examples 2-23

syntax 2-23

using 2-23

closing an active terminal session 2-40

command line editing (table) 1-4

command modes

described 1-5

event action rules configuration 1-5

EXEC 1-5

global configuration 1-5

privileged EXEC 1-5

service mode configuration 1-5

signature definition configuration 1-5

commands

show inventory 2-118

viewing list of most recently used 2-107

configure

described 2-24

examples 2-24

syntax 2-24

using 2-24

copy

described 2-25

examples 2-26

syntax 2-25

using 2-25

copy ad-knowledge-base

described 2-28

examples 2-29

syntax 2-28

using 2-28

copying

configuration files 2-25

iplogs 2-25

copy instance

described 2-30

examples 2-30

syntax 2-30

using 2-30

creating

banner message 2-8

users 2-159

Ctrl-N 1-3

Ctrl-P 1-3

D

default keywords using 1-8

deleting a logical file 2-36

denied attackers removing 2-16

directing output to the serial connection 2-33

displaying

current level of privilege 2-123

current system status 2-137

historical interface statistics 2-115

interface statistics 2-113

IP log contents 2-43

IP packet route 2-155

known hosts table 2-131

live traffic 2-58

local event log contents 2-99

PEP information 2-118

public RSA keys 2-127

sensor trusted hosts 2-140

server TLS certificate fingerprint 2-139

specific number of lines on screen 2-151

SSH server host key 2-129

statistics 2-132

system clock 2-96

user information 2-141

version information 2-143

display-serial

described 2-33

examples 2-33

using 2-33

downgrade

described 2-34

examples 2-34

related commands 2-34

E

end

described 2-35

examples 2-35

entering

global configuration 2-24

service configuration mode 2-70

erase

described 2-36

examples 2-36

syntax 2-36

using 2-36

erase ad-knowledge-base

described 2-37

examples 2-37

syntax 2-37

using 2-37

erase license-key

described 2-39

examples 2-39

using 2-39

error events viewing 2-99

error messages

described A-1

validation A-4

event-action-rules name described 2-70

event log viewing contents of 2-99

events

clearing 2-18

deleting 2-18

Event Store clearing events 2-18, 2-106

exit

described 2-40

examples 2-40

using 2-40

exiting

configuration mode 2-35, 2-40

submodes 2-35

F

files

anomaly detection

loading 2-4

saving 2-5

G

generating

server host key 2-148

X.509 certificate 2-152

generic commands 1-7

H

help

question mark 1-3

using 1-3

I

initializing the sensor 2-74

iplog

described 2-41

examples 2-42

related commands 2-42

syntax 2-41

using 2-41

iplog-status

described 2-43

examples 2-44

syntax 2-43

using 2-43

IP packet display route 2-155

K

keywords

default 1-8

no 1-8

L

limitations for concurrent CLI sessions 1-1

list component-configurations

described 2-45

examples 2-45

using 2-45

locking user accounts 2-6

M

modifying

privilege level 2-65

terminal properties for a login session 2-151

monitoring viewer privileges 1-2

more exclude

described 2-52

examples 2-52

related commands 2-55

syntax 2-52

using 2-52

more include

described 2-56

related commands 2-57

N

network connectivity testing for 2-63

O

operator privileges 1-2

output

clearing current line 1-4

displaying 1-4

setting number of lines to display 2-151

P

packet

described 2-58

examples 2-59

related commands 2-60

syntax 2-58

using 2-59

password

changing 2-61

described 2-61

examples 2-62

related commands 2-62

syntax 2-61

updating 2-61

using 2-61

ping

described 2-63

examples 2-63

syntax 2-63

using 2-63

platforms concurrent CLI sessions 1-1

privilege

described 2-65

examples 2-65

modifying 2-65

related commands 2-65

syntax 2-65

prompts default input 1-2

R

recall

help and tab completion 1-3

using 1-3

recover

described 2-66

examples 2-66

syntax 2-66

using 2-66

regular expression syntax

described 1-5

table 1-6

removing

service packs 2-34

signature updates 2-34

rename ad-knowledge-base

described 2-68

examples 2-68

syntax 2-68

using 2-68

reset

described 2-69

examples 2-69

syntax 2-69

using 2-69

route displaying IP packet 2-155

S

service

analysis-engine 2-70

anomaly-detection name 2-70

authentication 2-70

described 2-70

event-action-rules name 2-70

examples 2-72

external-product-interface 2-70

host 2-70

interface 2-70

logger 2-70

network-access 2-70

notification 2-70

privileges 1-2

role 1-2

signature-definition name 2-70

ssh-known-hosts 2-70

syntax 2-70

trusted-certificate 2-70

using 1-2, 2-72

web-server 2-70

setting the system clock 2-23

setup

clock setting parameters (table) 2-76

described 2-74

examples 2-76

using 2-75

show begin

described 2-94

examples 2-94

syntax 2-94

using 2-94

show clock

authoritative flags 2-96

described 2-96

examples 2-96

syntax 2-96

using 2-96

show events

described 2-99

examples 2-100

syntax 2-99

using 2-100

show exclude

described 2-102

examples 2-102

related commands 2-104

syntax 2-102

using 2-102

show history

described 2-107

examples 2-107

using 2-107

show include

described 2-108

examples 2-108

related commands 2-108

using 2-108

show inspection-load

described 2-110

examples 2-110

using 2-110

show interfaces

described 2-113

examples 2-114

syntax 2-113

using 2-113

show interfaces-historical

examples 2-116

using 2-115

show interfaces-history

described 2-115

syntax 2-115

show inventory

described 2-118

examples 2-118

using 2-118

show inventory command 2-118

show privilege

described 2-123

examples 2-123

related commands 2-123

using 2-123

show settings

described 2-124

examples 2-124

syntax 2-124

show ssh authorized-keys

described 2-127

examples 2-127

related commands 2-128

syntax 2-127

using 2-127

show ssh host-keys

described 2-131

examples 2-131

related commands 2-131

syntax 2-131

using 2-131

show ssh server-key

described 2-129

examples 2-129

related commands 2-130

show statistics

described 2-132

syntax 2-132

show tech-support

described 2-137

examples 2-138

syntax 2-137

using 2-137

varlog files 2-138

show tls fingerprint

described 2-139

examples 2-139

related commands 2-139

show tls trusted-hosts

described 2-140

examples 2-140

related commands 2-140

syntax 2-140

using 2-140

show users

described 2-141

examples 2-141

related commands 2-142

syntax 2-141

using 2-141

show version

described 2-143

examples 2-143

using 2-143

signature-definition name described 2-70

ssh authorized-key

described 2-146

examples 2-147

related commands 2-147

syntax 2-146

using 2-146

ssh generate-key

described 2-148

examples 2-148

related commands 2-148

using 2-148

ssh host-key

described 2-149

examples 2-150

related commands 2-150

syntax 2-149

using 2-149

starting IP logging 2-41

statistics

clearing 2-132

viewing 2-132

status events viewing 2-99

syntax case sensitivity 1-3

System Configuration Dialog 2-75

system information exporting to FTP or SCP server 2-137

system viewing status 2-137

T

tab completion using 1-3

tech support

viewing

control transaction responses 2-137

current configuration information 2-137

debug logs 2-137

version 2-137

terminal

described 2-151

examples 2-151

syntax 2-151

using 2-151

terminating a CLI session 2-19

tls generate-key

described 2-152

examples 2-152

related commands 2-152

tls trusted-host

described 2-153

examples 2-153

related commands 2-154

syntax 2-153

using 2-153

trace

described 2-155

examples 2-155

using 2-155

U

unlocking user accounts 2-158

unlock user

described 2-158

examples 2-158

related commands 2-158

syntax 2-158

using 2-158

updating the password 2-61

upgrade

described 2-156

examples 2-157

syntax 2-156

using 2-156

upgrading the system 2-156

username

described 2-159

examples 2-159

related commands 2-160

syntax 2-159

using 2-159

user roles

administrator 1-1

operator 1-1

service 1-1

viewer 1-1

using

anomaly detection file 2-5

banner login 2-8

clear denied-attackers 2-16, 2-31

clear os-identification 2-21

copy ad-knowledge-base 2-28

copy instance 2-30

erase ad-knowledge-base 2-37

erase license-key 2-39

list component-configurations 2-45

rename ad-knowledge-base 2-68

show inspection-load 2-110

V

validation error messages described A-4

viewer privileges 1-2

viewing

alerts 2-99

block requests 2-99

error events 2-99

IPS processes 2-143

operating system 2-143

signature packages 2-143

status events 2-99