Table Of Contents
A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - R - S - T - U - V -
Index
A
adding
an entry to the known hosts table 2-149
a public key 2-146
a trusted host 2-153
administrator privileges 1-1
alerts viewing 2-99
anomaly detection file
loading 2-4
saving 2-5
using 2-5
anomaly-detection load
described 2-4
examples 2-4
syntax 2-4
anomaly-detection name described 2-70
anomaly-detection save
described 2-5
examples 2-5
syntax 2-5
application partition reimaging 2-66
applying
service packs 2-156
signature updates 2-156
attacker IP address removing 2-16
attemptLimit
described 2-6
examples 2-6
related commands 2-7
syntax 2-6
B
banner login
described 2-8
examples 2-8
using 2-8
banner message creating 2-8
block requests viewing 2-99
C
capturing live traffic 2-58
changing the password 2-61
clear denied-attackers
described 2-16
examples 2-16, 2-32
syntax 2-16, 2-31
using 2-16, 2-31
clear events
described 2-18
examples 2-18, 2-106
using 2-18, 2-106
clear line
described 2-19
examples 2-19
syntax 2-19
using 2-19
clear os-identification
described 2-21
examples 2-22
syntax 2-21
using 2-21
CLI
command line editing 1-4
command modes 1-5
default keywords 1-8
error messages A-1
generic commands 1-7
regular expression syntax 1-5
CLI behavior
case sensitivity 1-3
described 1-2
display options 1-4
help 1-3
prompts 1-2
recall 1-3
tab completion 1-3
clock set
described 2-23
examples 2-23
syntax 2-23
using 2-23
closing an active terminal session 2-40
command line editing (table) 1-4
command modes
described 1-5
event action rules configuration 1-5
EXEC 1-5
global configuration 1-5
privileged EXEC 1-5
service mode configuration 1-5
signature definition configuration 1-5
commands
show inventory 2-118
viewing list of most recently used 2-107
configure
described 2-24
examples 2-24
syntax 2-24
using 2-24
copy
described 2-25
examples 2-26
syntax 2-25
using 2-25
copy ad-knowledge-base
described 2-28
examples 2-29
syntax 2-28
using 2-28
copying
configuration files 2-25
iplogs 2-25
copy instance
described 2-30
examples 2-30
syntax 2-30
using 2-30
creating
banner message 2-8
users 2-159
Ctrl-N 1-3
Ctrl-P 1-3
D
default keywords using 1-8
deleting a logical file 2-36
denied attackers removing 2-16
directing output to the serial connection 2-33
displaying
current level of privilege 2-123
current system status 2-137
historical interface statistics 2-115
interface statistics 2-113
IP log contents 2-43
IP packet route 2-155
known hosts table 2-131
live traffic 2-58
local event log contents 2-99
PEP information 2-118
public RSA keys 2-127
sensor trusted hosts 2-140
server TLS certificate fingerprint 2-139
specific number of lines on screen 2-151
SSH server host key 2-129
statistics 2-132
system clock 2-96
user information 2-141
version information 2-143
display-serial
described 2-33
examples 2-33
using 2-33
downgrade
described 2-34
examples 2-34
related commands 2-34
E
end
described 2-35
examples 2-35
entering
global configuration 2-24
service configuration mode 2-70
erase
described 2-36
examples 2-36
syntax 2-36
using 2-36
erase ad-knowledge-base
described 2-37
examples 2-37
syntax 2-37
using 2-37
erase license-key
described 2-39
examples 2-39
using 2-39
error events viewing 2-99
error messages
described A-1
validation A-4
event-action-rules name described 2-70
event log viewing contents of 2-99
events
clearing 2-18
deleting 2-18
Event Store clearing events 2-18, 2-106
exit
described 2-40
examples 2-40
using 2-40
exiting
configuration mode 2-35, 2-40
submodes 2-35
F
files
anomaly detection
loading 2-4
saving 2-5
G
generating
server host key 2-148
X.509 certificate 2-152
generic commands 1-7
H
help
question mark 1-3
using 1-3
I
initializing the sensor 2-74
iplog
described 2-41
examples 2-42
related commands 2-42
syntax 2-41
using 2-41
iplog-status
described 2-43
examples 2-44
syntax 2-43
using 2-43
IP packet display route 2-155
K
keywords
default 1-8
no 1-8
L
limitations for concurrent CLI sessions 1-1
list component-configurations
described 2-45
examples 2-45
using 2-45
locking user accounts 2-6
M
modifying
privilege level 2-65
terminal properties for a login session 2-151
monitoring viewer privileges 1-2
more exclude
described 2-52
examples 2-52
related commands 2-55
syntax 2-52
using 2-52
more include
described 2-56
related commands 2-57
N
network connectivity testing for 2-63
O
operator privileges 1-2
output
clearing current line 1-4
displaying 1-4
setting number of lines to display 2-151
P
packet
described 2-58
examples 2-59
related commands 2-60
syntax 2-58
using 2-59
password
changing 2-61
described 2-61
examples 2-62
related commands 2-62
syntax 2-61
updating 2-61
using 2-61
ping
described 2-63
examples 2-63
syntax 2-63
using 2-63
platforms concurrent CLI sessions 1-1
privilege
described 2-65
examples 2-65
modifying 2-65
related commands 2-65
syntax 2-65
prompts default input 1-2
R
recall
help and tab completion 1-3
using 1-3
recover
described 2-66
examples 2-66
syntax 2-66
using 2-66
regular expression syntax
described 1-5
table 1-6
removing
service packs 2-34
signature updates 2-34
rename ad-knowledge-base
described 2-68
examples 2-68
syntax 2-68
using 2-68
reset
described 2-69
examples 2-69
syntax 2-69
using 2-69
route displaying IP packet 2-155
S
service
analysis-engine 2-70
anomaly-detection name 2-70
authentication 2-70
described 2-70
event-action-rules name 2-70
examples 2-72
external-product-interface 2-70
host 2-70
interface 2-70
logger 2-70
network-access 2-70
notification 2-70
privileges 1-2
role 1-2
signature-definition name 2-70
ssh-known-hosts 2-70
syntax 2-70
trusted-certificate 2-70
using 1-2, 2-72
web-server 2-70
setting the system clock 2-23
setup
clock setting parameters (table) 2-76
described 2-74
examples 2-76
using 2-75
show begin
described 2-94
examples 2-94
syntax 2-94
using 2-94
show clock
authoritative flags 2-96
described 2-96
examples 2-96
syntax 2-96
using 2-96
show events
described 2-99
examples 2-100
syntax 2-99
using 2-100
show exclude
described 2-102
examples 2-102
related commands 2-104
syntax 2-102
using 2-102
show history
described 2-107
examples 2-107
using 2-107
show include
described 2-108
examples 2-108
related commands 2-108
using 2-108
show inspection-load
described 2-110
examples 2-110
using 2-110
show interfaces
described 2-113
examples 2-114
syntax 2-113
using 2-113
show interfaces-historical
examples 2-116
using 2-115
show interfaces-history
described 2-115
syntax 2-115
show inventory
described 2-118
examples 2-118
using 2-118
show inventory command 2-118
show privilege
described 2-123
examples 2-123
related commands 2-123
using 2-123
show settings
described 2-124
examples 2-124
syntax 2-124
show ssh authorized-keys
described 2-127
examples 2-127
related commands 2-128
syntax 2-127
using 2-127
show ssh host-keys
described 2-131
examples 2-131
related commands 2-131
syntax 2-131
using 2-131
show ssh server-key
described 2-129
examples 2-129
related commands 2-130
show statistics
described 2-132
syntax 2-132
show tech-support
described 2-137
examples 2-138
syntax 2-137
using 2-137
varlog files 2-138
show tls fingerprint
described 2-139
examples 2-139
related commands 2-139
show tls trusted-hosts
described 2-140
examples 2-140
related commands 2-140
syntax 2-140
using 2-140
show users
described 2-141
examples 2-141
related commands 2-142
syntax 2-141
using 2-141
show version
described 2-143
examples 2-143
using 2-143
signature-definition name described 2-70
ssh authorized-key
described 2-146
examples 2-147
related commands 2-147
syntax 2-146
using 2-146
ssh generate-key
described 2-148
examples 2-148
related commands 2-148
using 2-148
ssh host-key
described 2-149
examples 2-150
related commands 2-150
syntax 2-149
using 2-149
starting IP logging 2-41
statistics
clearing 2-132
viewing 2-132
status events viewing 2-99
syntax case sensitivity 1-3
System Configuration Dialog 2-75
system information exporting to FTP or SCP server 2-137
system viewing status 2-137
T
tab completion using 1-3
tech support
viewing
control transaction responses 2-137
current configuration information 2-137
debug logs 2-137
version 2-137
terminal
described 2-151
examples 2-151
syntax 2-151
using 2-151
terminating a CLI session 2-19
tls generate-key
described 2-152
examples 2-152
related commands 2-152
tls trusted-host
described 2-153
examples 2-153
related commands 2-154
syntax 2-153
using 2-153
trace
described 2-155
examples 2-155
using 2-155
U
unlocking user accounts 2-158
unlock user
described 2-158
examples 2-158
related commands 2-158
syntax 2-158
using 2-158
updating the password 2-61
upgrade
described 2-156
examples 2-157
syntax 2-156
using 2-156
upgrading the system 2-156
username
described 2-159
examples 2-159
related commands 2-160
syntax 2-159
using 2-159
user roles
administrator 1-1
operator 1-1
service 1-1
viewer 1-1
using
anomaly detection file 2-5
banner login 2-8
clear denied-attackers 2-16, 2-31
clear os-identification 2-21
copy ad-knowledge-base 2-28
copy instance 2-30
erase ad-knowledge-base 2-37
erase license-key 2-39
list component-configurations 2-45
rename ad-knowledge-base 2-68
show inspection-load 2-110
V
validation error messages described A-4
viewer privileges 1-2
viewing
alerts 2-99
block requests 2-99
error events 2-99
IPS processes 2-143
operating system 2-143
signature packages 2-143
status events 2-99