The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
A
adding
an entry to the known hosts table 2-143
a public key 2-140
a trusted host 2-147
administrator privileges 1-1
alerts viewing 2-98
anomaly detection file
loading 2-4
saving 2-5
using 2-5
anomaly-detection load
described 2-4
examples 2-4
syntax 2-4
anomaly-detection name described 2-69
anomaly-detection save
described 2-5
examples 2-5
syntax 2-5
application partition reimaging 2-65
applying
service packs 2-150
signature updates 2-150
attacker IP address removing 2-15
attemptLimit
described 2-6
examples 2-6
related commands 2-6
syntax 2-6
using 2-6
B
banner login
described 2-7
examples 2-7
using 2-7
banner message creating 2-7
block requests viewing 2-98
C
capturing live traffic 2-57
changing the password 2-60
clear denied-attackers
described 2-15
clear events
described 2-17
clear line
described 2-18
examples 2-18
syntax 2-18
using 2-18
clear os-identification
described 2-20
examples 2-21
syntax 2-20
using 2-20
CLI
command line editing 1-4
command modes 1-5
default keywords 1-8
error messages A-1
generic commands 1-7
regular expression syntax 1-5
CLI behavior
case sensitivity 1-3
described 1-2
display options 1-4
help 1-3
prompts 1-2
recall 1-3
tab completion 1-3
clock set
described 2-22
examples 2-22
syntax 2-22
using 2-22
closing an active terminal session 2-39
command line editing (table) 1-4
command modes
described 1-5
event action rules configuration 1-5
EXEC 1-5
global configuration 1-5
privileged EXEC 1-5
service mode configuration 1-5
signature definition configuration 1-5
commands
viewing list of most recently used 2-105
configure
described 2-23
examples 2-23
syntax 2-23
using 2-23
copy
described 2-24
examples 2-25
syntax 2-24
using 2-24
copy ad-knowledge-base
described 2-27
examples 2-28
syntax 2-27
using 2-27
copying
configuration files 2-24
iplogs 2-24
copy instance
described 2-29
examples 2-29
syntax 2-29
using 2-29
creating
banner message 2-7
users 2-153
Ctrl-N 1-3
Ctrl-P 1-3
D
default keywords using 1-8
deleting a logical file 2-35
denied attackers removing 2-15
directing output to the serial connection 2-32
displaying
current level of privilege 2-118
current system status 2-131
interface statistics 2-111
IP log contents 2-42
IP packet route 2-149
known hosts table 2-125
live traffic 2-57
local event log contents 2-98
PEP information 2-114
public RSA keys 2-122
sensor trusted hosts 2-134
server TLS certificate fingerprint 2-133
specific number of lines on screen 2-145
SSH server host key 2-124
statistics 2-126
system clock 2-95
user information 2-135
version information 2-137
display-serial
described 2-32
examples 2-32
using 2-32
downgrade
described 2-33
examples 2-33
related commands 2-33
E
end
described 2-34
examples 2-34
entering
global configuration 2-23
service configuration mode 2-69
erase
described 2-35
examples 2-35
syntax 2-35
using 2-35
erase ad-knowledge-base
described 2-36
examples 2-36
syntax 2-36
using 2-36
erase license-key
described 2-38
examples 2-38
using 2-38
error events viewing 2-98
error messages
described A-1
validation A-4
event-action-rules name described 2-69
event log viewing contents of 2-98
events
clearing 2-17
deleting 2-17
Event Store clearing events 2-17, 2-104
exit
described 2-39
examples 2-39
using 2-39
exiting
submodes 2-34
F
files
anomaly detection
loading 2-4
saving 2-5
G
generating
server host key 2-142
X.509 certificate 2-146
generic commands 1-7
H
help
question mark 1-3
using 1-3
I
initializing the sensor 2-73
iplog
described 2-40
examples 2-41
related commands 2-41
syntax 2-40
using 2-40
iplog-status
described 2-42
examples 2-43
syntax 2-42
using 2-42
IP packet display route 2-149
K
keywords
default 1-8
no 1-8
L
limitations for concurrent CLI sessions 1-1
list component-configurations
described 2-44
examples 2-44
using 2-44
locking user accounts 2-6
M
modifying
privilege level 2-64
terminal properties for a login session 2-145
monitoring viewer privileges 1-2
more exclude
described 2-51
examples 2-51
related commands 2-54
syntax 2-51
using 2-51
more include
described 2-55
related commands 2-56
N
network connectivity testing for 2-62
O
operator privileges 1-2
output
clearing current line 1-4
displaying 1-4
setting number of lines to display 2-145
P
packet
described 2-57
examples 2-58
related commands 2-59
syntax 2-57
using 2-58
password
changing 2-60
described 2-60
examples 2-61
related commands 2-61
syntax 2-60
updating 2-60
using 2-60
ping
described 2-62
examples 2-62
syntax 2-62
using 2-62
platforms concurrent CLI sessions 1-1
privilege
described 2-64
examples 2-64
modifying 2-64
related commands 2-64
syntax 2-64
prompts default input 1-2
R
recall
help and tab completion 1-3
using 1-3
recover
described 2-65
examples 2-65
syntax 2-65
using 2-65
regular expression syntax
described 1-5
table 1-6
removing
service packs 2-33
signature updates 2-33
rename ad-knowledge-base
described 2-67
examples 2-67
syntax 2-67
using 2-67
reset
described 2-68
examples 2-68
syntax 2-68
using 2-68
route displaying IP packet 2-149
S
service
analysis-engine 2-69
anomaly-detection name 2-69
authentication 2-69
described 2-69
event-action-rules name 2-69
examples 2-71
external-product-interface 2-69
host 2-69
interface 2-69
logger 2-69
network-access 2-69
notification 2-69
privileges 1-2
role 1-2
signature-definition name 2-69
ssh-known-hosts 2-69
syntax 2-69
trusted-certificate 2-69
web-server 2-69
setting the system clock 2-22
setup
clock setting parameters (table) 2-75
described 2-73
examples 2-75
using 2-74
show begin
described 2-93
examples 2-93
syntax 2-93
using 2-93
show clock
authoritative flags 2-95
described 2-95
examples 2-95
syntax 2-95
using 2-95
show events
described 2-98
examples 2-99
syntax 2-98
using 2-99
show exclude
described 2-101
examples 2-101
related commands 2-103
syntax 2-101
using 2-101
show history
described 2-105
examples 2-105
using 2-105
show include
described 2-106
examples 2-106
related commands 2-106
using 2-106
show inspection-load
described 2-108
examples 2-108
using 2-108
show interfaces
described 2-111
examples 2-112
syntax 2-111
using 2-111
show inventory
described 2-114
examples 2-114
using 2-114
show privilege
described 2-118
examples 2-118
related commands 2-118
using 2-118
show settings
described 2-119
examples 2-119
syntax 2-119
show ssh authorized-keys
described 2-122
examples 2-122
related commands 2-123
syntax 2-122
using 2-122
show ssh host-keys
described 2-125
examples 2-125
related commands 2-125
syntax 2-125
using 2-125
show ssh server-key
described 2-124
examples 2-124
related commands 2-124
show statistics
described 2-126
syntax 2-126
show tech-support
described 2-131
examples 2-132
syntax 2-131
using 2-131
show tls fingerprint
described 2-133
examples 2-133
related commands 2-133
show tls trusted-hosts
described 2-134
examples 2-134
related commands 2-134
syntax 2-134
using 2-134
show users
described 2-135
examples 2-135
related commands 2-136
syntax 2-135
using 2-135
show version
described 2-137
examples 2-137
using 2-137
signature-definition name described 2-69
ssh authorized-key
described 2-140
examples 2-140
related commands 2-141
syntax 2-140
using 2-140
ssh generate-key
described 2-142
examples 2-142
related commands 2-142
using 2-142
ssh host-key
described 2-143
examples 2-144
related commands 2-144
syntax 2-143
using 2-143
starting IP logging 2-40
statistics
clearing 2-126
viewing 2-126
status events viewing 2-98
syntax case sensitivity 1-3
System Configuration Dialog 2-74
system information exporting to FTP or SCP server 2-131
system viewing status 2-131
T
tab completion using 1-3
tech support
viewing
control transaction responses 2-131
current configuration information 2-131
debug logs 2-131
version 2-131
terminal
described 2-145
examples 2-145
syntax 2-145
using 2-145
terminating a CLI session 2-18
tls generate-key
described 2-146
examples 2-146
related commands 2-146
tls trusted-host
described 2-147
examples 2-147
related commands 2-148
syntax 2-147
using 2-147
trace
described 2-149
examples 2-149
using 2-149
U
unlocking user accounts 2-152
unlock user
described 2-152
examples 2-152
related commands 2-152
syntax 2-152
using 2-152
updating the password 2-60
upgrade
described 2-150
examples 2-151
syntax 2-150
using 2-150
upgrading the system 2-150
username
described 2-153
examples 2-153
related commands 2-154
syntax 2-153
using 2-153
user roles
administrator 1-1
operator 1-1
service 1-1
viewer 1-1
using
anomaly detection file 2-5
banner login 2-7
clear denied-attackers 2-15, 2-30
clear os-identification 2-20
copy ad-knowledge-base 2-27
copy instance 2-29
erase ad-knowledge-base 2-36
erase license-key 2-38
list component-configurations 2-44
rename ad-knowledge-base 2-67
show inspection-load 2-108
V
validation error messages described A-4
viewer privileges 1-2
viewing
alerts 2-98
block requests 2-98
error events 2-98
IPS processes 2-137
operating system 2-137
signature packages 2-137
status events 2-98