The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
A
adding
an entry to the known hosts table 2-116
a public key 2-113
a trusted host 2-120
Administrators
privileges 1-1
alerts
viewing 2-82
anomaly detection file
loading 2-4
saving 2-5
using 2-5
anomaly-detection load
described 2-4
examples 2-4
syntax 2-4
anomaly-detection name
described 2-54
anomaly-detection save
described 2-5
examples 2-5
syntax 2-5
application partition
reimaging 2-50
applying
service packs 2-123
signature updates 2-123
attacker IP address
removing from list of denied IP addresses 2-8
B
banner login
described 2-6
examples 2-6
syntax 2-6
using 2-6
banner message
creating 2-6
block requests
viewing 2-82
C
capturing
live traffic 2-42
changing the password 2-45
clear denied-attackers
described 2-8
examples 2-8
syntax 2-8
using 2-8
clear events
described 2-10
examples 2-10
using 2-10
clear line
described 2-11
examples 2-11
syntax 2-11
using 2-11
clear os-identification
described 2-13
examples 2-13
syntax 2-13
using 2-13
CLI
command line editing 1-4
command modes 1-5
default keywords 1-8
error messages A-1
generic commands 1-7
regular expression syntax 1-5
CLI behavior
case sensitivity 1-3
described 1-2
display options 1-3
help 1-2
prompts 1-2
recall 1-3
tab completion 1-3
clock set
described 2-14
examples 2-14
syntax 2-14
using 2-14
closing an active terminal session 2-28
command line editing (table) 1-4
command modes
described 1-5
event action rules configuration 1-5
EXEC 1-5
global configuration 1-5
privileged EXEC 1-5
service mode configuration 1-5
signature definition configuration 1-5
command platform dependencies 1-8
commands
platform dependencies 1-8
viewing list of most recently used 2-86
configure
described 2-15
examples 2-15
syntax 2-15
using 2-15
copy
described 2-16
examples 2-17
syntax 2-16
using 2-16
copy ad-knowledge-base
described 2-19
examples 2-20
syntax 2-19
using 2-19
copying
configuration files 2-16
iplogs 2-16
copy instance
described 2-21
examples 2-21
syntax 2-21
using 2-21
creating
banner message 2-6
users 2-125
Ctrl-N 1-3
Ctrl-P 1-3
D
default keywords
using 1-8
deleting a logical file 2-25
denied attackers
removing 2-8
directing output to the serial connection 2-22
display
specifying number of lines on screen 2-118
displaying
current level of privilege 2-94
current system status 2-105
interface statistics 2-89
IP log contents 2-31
IP packet route 2-122
known hosts table 2-101
live traffic 2-42
local event log contents 2-82
PEP information 2-91
public RSA keys 2-98
sensor trusted hosts 2-108
server TLS certificate fingerprint 2-107
SSH server's host key 2-100
statistics 2-102
system clock 2-79
user information 2-109
version information 2-111
display-serial
described 2-22
examples 2-22
using 2-22
downgrade
described 2-23
examples 2-23
related commands 2-23
E
end
described 2-24
examples 2-24
entering
global configuration 2-15
service configuration mode 2-54
erase
described 2-25
examples 2-25
syntax 2-25
using 2-25
erase ad-knowledge-base
described 2-26
examples 2-26
syntax 2-26
using 2-26
error events
viewing 2-82
error messages
described A-1
validation A-4
event-action-rules name
described 2-54
event log
viewing contents of 2-82
events
clearing 2-10
deleting 2-10
Event Store
clearing events 2-10
exit
described 2-28
examples 2-28
using 2-28
exiting
submodes 2-24
F
files
anomaly detection
loading 2-4
saving 2-5
G
generating
server host key 2-115
X.509 certificate 2-119
generic commands 1-7
H
help
question mark 1-2
using 1-2
I
initializing the sensor 2-57
iplog
described 2-29
examples 2-29
related commands 2-30
syntax 2-29
using 2-29
iplog-status
described 2-31
examples 2-32
syntax 2-31
using 2-31
IP packet
display route 2-122
K
keywords
default 1-8
no 1-8
L
limitations
concurrent CLI sessions 1-1
list component-configurations
described 2-33
examples 2-33
using 2-33
M
modifying
privilege level 2-49
terminal properties for a login session 2-118
monitoring
Viewer privileges 1-2
more exclude
described 2-38
examples 2-38
related commands 2-39
syntax 2-38
using 2-38
more include
described 2-40
related commands 2-41
syntax 2-40
N
network connectivity
testing for 2-47
O
Operators
privileges 1-2
output
clearing current line 1-3
displaying 1-3
setting number of lines to display 2-118
P
packet
described 2-42
examples 2-43
related commands 2-44
syntax 2-42
using 2-43
password
changing 2-45
described 2-45
examples 2-46
related commands 2-46
syntax 2-45
updating 2-45
using 2-45
ping
described 2-47
examples 2-47
syntax 2-47
using 2-47
platforms
concurrent CLI sessions 1-1
privilege
described 2-49
examples 2-49
modifying 2-49
related commands 2-49
syntax 2-49
prompts
default input 1-2
R
recall
help and tab completion 1-3
using 1-3
recover
described 2-50
examples 2-50
syntax 2-50
using 2-50
regular expression syntax
described 1-5
table 1-6
removing
service packs 2-23
signature updates 2-23
rename ad-knowledge-base
described 2-52
examples 2-52
syntax 2-52
using 2-52
reset
described 2-53
examples 2-53
syntax 2-53
using 2-53
route
displaying for IP packet 2-122
S
Service
privileges 1-2
role 1-2
using 1-2
service
analysis-engine 2-54
anomaly-detection name 2-54
authentication 2-54
described 2-54
event-action-rules name 2-54
examples 2-56
external-product-interface 2-54
host 2-54
interface 2-54
logger 2-54
network-access 2-54
notification 2-54
signature-definition name 2-54
ssh-known-hosts 2-54
syntax 2-54
trusted-certificate 2-54
using 2-55
web-server 2-54
service account
privileges 1-2
setting the system clock 2-14
setup
clock setting parameters (table) 2-58
described 2-57
examples 2-59
using 2-58
show begin
described 2-77
examples 2-77
syntax 2-77
using 2-77
show clock
authoritative flags 2-79
described 2-79
examples 2-79
syntax 2-79
using 2-79
show events
described 2-82
examples 2-83
syntax 2-82
using 2-83
show exclude
described 2-84
examples 2-84
related commands 2-85
syntax 2-84
using 2-84
show history
described 2-86
examples 2-86
using 2-86
show include
described 2-87
examples 2-87
related commands 2-87
using 2-87
show interfaces
described 2-89
examples 2-90
syntax 2-89
using 2-89
show inventory
described 2-91
examples 2-91
using 2-91
show privilege
described 2-94
examples 2-94
related commands 2-94
using 2-94
show settings
described 2-95
examples 2-95
syntax 2-95
show ssh authorized-keys
described 2-98
examples 2-98
related commands 2-99
syntax 2-98
using 2-98
show ssh host-keys
described 2-101
examples 2-101
related commands 2-101
syntax 2-101
using 2-101
show ssh server-key
described 2-100
examples 2-100
related commands 2-100
show statistics
described 2-102
syntax 2-102
show tech-support
described 2-105
examples 2-106
syntax 2-105
using 2-105
show tls fingerprint
related commands 2-107
show tls-fingerprint
described 2-107
examples 2-107
show tls trusted-hosts
described 2-108
examples 2-108
related commands 2-108
syntax 2-108
using 2-108
show users
described 2-109
examples 2-109
related commands 2-110
syntax 2-109
using 2-109
show version
described 2-111
examples 2-111
using 2-111
signature-definition name
described 2-54
ssh authorized-key
described 2-113
examples 2-113
related commands 2-114
syntax 2-113
using 2-113
ssh generate-key
described 2-115
examples 2-115
related commands 2-115
using 2-115
ssh host-key
described 2-116
examples 2-117
related commands 2-117
syntax 2-116
using 2-116
starting IP logging 2-29
statistics
clearing 2-102
viewing 2-102
status events
viewing 2-82
syntax
case sensitivity 1-3
system
viewing status 2-105
System Configuration Dialog 2-58
system information
exporting to FTP or SCP server 2-105
T
tab completion
using 1-3
tech support
viewing
control transaction responses 2-105
current configuration information 2-105
debug logs 2-105
version 2-105
terminal
described 2-118
examples 2-118
syntax 2-118
using 2-118
terminating a CLI session 2-11
tls generate-key
described 2-119
examples 2-119
related commands 2-119
tls trusted-host
described 2-120
examples 2-120
related commands 2-121
syntax 2-120
using 2-120
trace
described 2-122
examples 2-122
using 2-122
U
updating the password 2-45
upgrade
described 2-123
examples 2-124
syntax 2-123
using 2-123
upgrading the system 2-123
username
described 2-125
examples 2-125
related commands 2-126
syntax 2-125
using 2-125
user roles
using
anomaly detection file 2-5
banner login 2-6
clear denied-attackers 2-8
clear os-identification 2-13
copy ad-knowledge-base 2-19
copy instance 2-21
erase ad-knowledge-base 2-26
list component-configurations 2-33
rename ad-knowledge-base 2-52
V
validation error messages
described A-4
Viewers
privileges 1-2
viewing
alerts 2-82
block requests 2-82
error events 2-82
IPS processes 2-111
operating system 2-111
signature packages 2-111
status events 2-82