The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
an entry to the known hosts table 2-151
a public key 2-148
a trusted host 2-155, 2-157
administrator privileges 1-1
alerts viewing 2-99
loading 2-4
saving 2-5
using 2-5
described 2-4
examples 2-4
syntax 2-4
anomaly-detection name described 2-70
described 2-5
examples 2-5
syntax 2-5
application partition reimaging 2-66
service packs 2-160
signature updates 2-160
attacker IP address removing 2-16
described 2-6
examples 2-6
related commands 2-7
syntax 2-6
described 2-8
examples 2-8
using 2-8
banner message creating 2-8
block requests viewing 2-99
capturing live traffic 2-58
changing the password 2-61
described 2-16
examples 2-16, 2-32
syntax 2-16, 2-31
using 2-16, 2-31
described 2-18
examples 2-18, 2-106
using 2-18, 2-106
described 2-19
examples 2-19
syntax 2-19
using 2-19
described 2-21
examples 2-22
syntax 2-21
using 2-21
command line editing 1-4
command modes 1-5
default keywords 1-8
error messages C-1
generic commands 1-7
regular expression syntax 1-5
case sensitivity 1-3
described 1-2
display options 1-4
help 1-3
prompts 1-2
recall 1-3
tab completion 1-3
described 2-23
examples 2-23
syntax 2-23
using 2-23
closing an active terminal session 2-40
command line editing (table) 1-4
described 1-5
event action rules configuration 1-5
EXEC 1-5
global configuration 1-5
privileged EXEC 1-5
service mode configuration 1-5
signature definition configuration 1-5
show inventory 2-118
viewing list of most recently used 2-107
described 2-24
examples 2-24
syntax 2-24
using 2-24
described 2-25
examples 2-26
syntax 2-25
using 2-25
described 2-28
examples 2-29
syntax 2-28
using 2-28
configuration files 2-25
iplogs 2-25
described 2-30
examples 2-30
syntax 2-30
using 2-30
banner message 2-8
users 2-163
Ctrl-N 1-3
Ctrl-P 1-3
default keywords using 1-8
deleting a logical file 2-36
denied attackers removing 2-16
directing output to the serial connection 2-33
current level of privilege 2-123
current system status 2-137
historical interface statistics 2-115
interface statistics 2-113
IP log contents 2-43
IP packet route 2-159
known hosts table 2-131
live traffic 2-58
local event log contents 2-99
PEP information 2-118
public RSA keys 2-127
sensor trusted hosts 2-140, 2-141
server TLS certificate fingerprint 2-139
specific number of lines on screen 2-153
SSH server host key 2-129
statistics 2-132
system clock 2-96
user information 2-143
version information 2-145
described 2-33
examples 2-33
using 2-33
described 2-34
examples 2-34
related commands 2-34
described 2-35
examples 2-35
global configuration 2-24
service configuration mode 2-70
described 2-36
examples 2-36
syntax 2-36
using 2-36
described 2-37
examples 2-37
syntax 2-37
using 2-37
described 2-39
examples 2-39
using 2-39
error events viewing 2-99
described C-1
validation C-4
event-action-rules name described 2-70
event log viewing contents of 2-99
clearing 2-18
deleting 2-18
Event Store clearing events 2-18, 2-106
described 2-40
examples 2-40
using 2-40
configuration mode 2-35, 2-40
submodes 2-35
loading 2-4
saving 2-5
server host key 2-150
X.509 certificate 2-154
generic commands 1-7
question mark 1-3
using 1-3
initializing the sensor 2-74
described 2-41
examples 2-42
related commands 2-42
syntax 2-41
using 2-41
described 2-43
examples 2-44
syntax 2-43
using 2-43
IP packet display route 2-159
default 1-8
no 1-8
limitations for concurrent CLI sessions 1-1
described 2-45
examples 2-45
using 2-45
locking user accounts 2-6
privilege level 2-65
terminal properties for a login session 2-153
monitoring viewer privileges 1-2
described 2-52
examples 2-52
related commands 2-55
syntax 2-52
using 2-52
described 2-56
related commands 2-57
network connectivity testing for 2-63
operator privileges 1-2
clearing current line 1-4
displaying 1-4
setting number of lines to display 2-153
described 2-58
examples 2-59
related commands 2-60
syntax 2-58
using 2-59
changing 2-61
described 2-61
examples 2-62
related commands 2-62
syntax 2-61
updating 2-61
using 2-61
described 2-63
examples 2-63
syntax 2-63
using 2-63
platforms concurrent CLI sessions 1-1
described 2-65
examples 2-65
modifying 2-65
related commands 2-65
syntax 2-65
prompts default input 1-2
help and tab completion 1-3
using 1-3
described 2-66
examples 2-66
syntax 2-66
using 2-66
described 1-5
table 1-6
service packs 2-34
signature updates 2-34
described 2-68
examples 2-68
syntax 2-68
using 2-68
described 2-69
examples 2-69
syntax 2-69
using 2-69
route displaying IP packet 2-159
analysis-engine 2-70
anomaly-detection name 2-70
authentication 2-70
described 2-70
event-action-rules name 2-70
examples 2-72
external-product-interface 2-70
host 2-70
interface 2-70
logger 2-70
network-access 2-70
notification 2-70
privileges 1-2
role 1-2
signature-definition name 2-70
ssh-known-hosts 2-70
syntax 2-70
trusted-certificate 2-70
using 1-2, 2-72
web-server 2-70
setting the system clock 2-23
clock setting parameters (table) 2-76
described 2-74
examples 2-76
using 2-75
described 2-94
examples 2-94
syntax 2-94
using 2-94
authoritative flags 2-96
described 2-96
examples 2-96
syntax 2-96
using 2-96
described 2-99
examples 2-100
syntax 2-99
using 2-100
described 2-102
examples 2-102
related commands 2-104
syntax 2-102
using 2-102
described 2-107
examples 2-107
using 2-107
described 2-108
examples 2-108
related commands 2-108
using 2-108
described 2-110
examples 2-110
using 2-110
described 2-113
examples 2-114
syntax 2-113
using 2-113
examples 2-116
using 2-115
described 2-115
syntax 2-115
described 2-118
examples 2-118
using 2-118
show inventory command 2-118
described 2-123
examples 2-123
related commands 2-123
using 2-123
described 2-124
examples 2-124
syntax 2-124
described 2-127
examples 2-127
related commands 2-128
syntax 2-127
using 2-127
described 2-131
examples 2-131
related commands 2-131
syntax 2-131
using 2-131
described 2-129
examples 2-129
related commands 2-130
described 2-132
syntax 2-132
described 2-137
examples 2-138
syntax 2-137
using 2-137
varlog files 2-138
described 2-139
examples 2-139
related commands 2-139
described 2-140, 2-141
examples 2-140, 2-141
related commands 2-140, 2-142
syntax 2-140
using 2-140, 2-141
described 2-143
examples 2-143
related commands 2-144
syntax 2-143
using 2-143
described 2-145
examples 2-145
using 2-145
signature-definition name described 2-70
described 2-148
examples 2-149
related commands 2-149
syntax 2-148
using 2-148
described 2-150
examples 2-150
related commands 2-150
using 2-150
described 2-151
examples 2-152
related commands 2-152
syntax 2-151
using 2-151
starting IP logging 2-41
clearing 2-132
viewing 2-132
status events viewing 2-99
syntax case sensitivity 1-3
System Configuration Dialog 2-75
system information exporting to FTP or SCP server 2-137
system viewing status 2-137
tab completion using 1-3
control transaction responses 2-137
current configuration information 2-137
debug logs 2-137
version 2-137
described 2-153
examples 2-153
syntax 2-153
using 2-153
terminating a CLI session 2-19
described 2-154
examples 2-154
related commands 2-154
described 2-155, 2-157
examples 2-155, 2-157
related commands 2-156, 2-158
syntax 2-155, 2-157
using 2-155, 2-157
described 2-159
examples 2-159
using 2-159
unlocking user accounts 2-162
described 2-162
examples 2-162
related commands 2-162
syntax 2-162
using 2-162
updating the password 2-61
described 2-160
examples 2-161
syntax 2-160
using 2-160
upgrading the system 2-160
described 2-163
examples 2-163
related commands 2-164
syntax 2-163
using 2-163
administrator 1-1
operator 1-1
service 1-1
viewer 1-1
anomaly detection file 2-5
banner login 2-8
clear denied-attackers 2-16, 2-31
clear os-identification 2-21
copy ad-knowledge-base 2-28
copy instance 2-30
erase ad-knowledge-base 2-37
erase license-key 2-39
list component-configurations 2-45
rename ad-knowledge-base 2-68
show inspection-load 2-110
validation error messages described C-4
viewer privileges 1-2
alerts 2-99
block requests 2-99
error events 2-99
IPS processes 2-145
operating system 2-145
signature packages 2-145
status events 2-99
Index
an entry to the known hosts table 2-151
a public key 2-148
a trusted host 2-155, 2-157
administrator privileges 1-1
alerts viewing 2-99
loading 2-4
saving 2-5
using 2-5
described 2-4
examples 2-4
syntax 2-4
anomaly-detection name described 2-70
described 2-5
examples 2-5
syntax 2-5
application partition reimaging 2-66
service packs 2-160
signature updates 2-160
attacker IP address removing 2-16
described 2-6
examples 2-6
related commands 2-7
syntax 2-6
described 2-8
examples 2-8
using 2-8
banner message creating 2-8
block requests viewing 2-99
capturing live traffic 2-58
changing the password 2-61
described 2-16
examples 2-16, 2-32
syntax 2-16, 2-31
using 2-16, 2-31
described 2-18
examples 2-18, 2-106
using 2-18, 2-106
described 2-19
examples 2-19
syntax 2-19
using 2-19
described 2-21
examples 2-22
syntax 2-21
using 2-21
command line editing 1-4
command modes 1-5
default keywords 1-8
error messages C-1
generic commands 1-7
regular expression syntax 1-5
case sensitivity 1-3
described 1-2
display options 1-4
help 1-3
prompts 1-2
recall 1-3
tab completion 1-3
described 2-23
examples 2-23
syntax 2-23
using 2-23
closing an active terminal session 2-40
command line editing (table) 1-4
described 1-5
event action rules configuration 1-5
EXEC 1-5
global configuration 1-5
privileged EXEC 1-5
service mode configuration 1-5
signature definition configuration 1-5
show inventory 2-118
viewing list of most recently used 2-107
described 2-24
examples 2-24
syntax 2-24
using 2-24
described 2-25
examples 2-26
syntax 2-25
using 2-25
described 2-28
examples 2-29
syntax 2-28
using 2-28
configuration files 2-25
iplogs 2-25
described 2-30
examples 2-30
syntax 2-30
using 2-30
banner message 2-8
users 2-163
Ctrl-N 1-3
Ctrl-P 1-3
default keywords using 1-8
deleting a logical file 2-36
denied attackers removing 2-16
directing output to the serial connection 2-33
current level of privilege 2-123
current system status 2-137
historical interface statistics 2-115
interface statistics 2-113
IP log contents 2-43
IP packet route 2-159
known hosts table 2-131
live traffic 2-58
local event log contents 2-99
PEP information 2-118
public RSA keys 2-127
sensor trusted hosts 2-140, 2-141
server TLS certificate fingerprint 2-139
specific number of lines on screen 2-153
SSH server host key 2-129
statistics 2-132
system clock 2-96
user information 2-143
version information 2-145
described 2-33
examples 2-33
using 2-33
described 2-34
examples 2-34
related commands 2-34
described 2-35
examples 2-35
global configuration 2-24
service configuration mode 2-70
described 2-36
examples 2-36
syntax 2-36
using 2-36
described 2-37
examples 2-37
syntax 2-37
using 2-37
described 2-39
examples 2-39
using 2-39
error events viewing 2-99
described C-1
validation C-4
event-action-rules name described 2-70
event log viewing contents of 2-99
clearing 2-18
deleting 2-18
Event Store clearing events 2-18, 2-106
described 2-40
examples 2-40
using 2-40
configuration mode 2-35, 2-40
submodes 2-35
loading 2-4
saving 2-5
server host key 2-150
X.509 certificate 2-154
generic commands 1-7
question mark 1-3
using 1-3
initializing the sensor 2-74
described 2-41
examples 2-42
related commands 2-42
syntax 2-41
using 2-41
described 2-43
examples 2-44
syntax 2-43
using 2-43
IP packet display route 2-159
default 1-8
no 1-8
limitations for concurrent CLI sessions 1-1
described 2-45
examples 2-45
using 2-45
locking user accounts 2-6
privilege level 2-65
terminal properties for a login session 2-153
monitoring viewer privileges 1-2
described 2-52
examples 2-52
related commands 2-55
syntax 2-52
using 2-52
described 2-56
related commands 2-57
network connectivity testing for 2-63
operator privileges 1-2
clearing current line 1-4
displaying 1-4
setting number of lines to display 2-153
described 2-58
examples 2-59
related commands 2-60
syntax 2-58
using 2-59
changing 2-61
described 2-61
examples 2-62
related commands 2-62
syntax 2-61
updating 2-61
using 2-61
described 2-63
examples 2-63
syntax 2-63
using 2-63
platforms concurrent CLI sessions 1-1
described 2-65
examples 2-65
modifying 2-65
related commands 2-65
syntax 2-65
prompts default input 1-2
help and tab completion 1-3
using 1-3
described 2-66
examples 2-66
syntax 2-66
using 2-66
described 1-5
table 1-6
service packs 2-34
signature updates 2-34
described 2-68
examples 2-68
syntax 2-68
using 2-68
described 2-69
examples 2-69
syntax 2-69
using 2-69
route displaying IP packet 2-159
analysis-engine 2-70
anomaly-detection name 2-70
authentication 2-70
described 2-70
event-action-rules name 2-70
examples 2-72
external-product-interface 2-70
host 2-70
interface 2-70
logger 2-70
network-access 2-70
notification 2-70
privileges 1-2
role 1-2
signature-definition name 2-70
ssh-known-hosts 2-70
syntax 2-70
trusted-certificate 2-70
using 1-2, 2-72
web-server 2-70
setting the system clock 2-23
clock setting parameters (table) 2-76
described 2-74
examples 2-76
using 2-75
described 2-94
examples 2-94
syntax 2-94
using 2-94
authoritative flags 2-96
described 2-96
examples 2-96
syntax 2-96
using 2-96
described 2-99
examples 2-100
syntax 2-99
using 2-100
described 2-102
examples 2-102
related commands 2-104
syntax 2-102
using 2-102
described 2-107
examples 2-107
using 2-107
described 2-108
examples 2-108
related commands 2-108
using 2-108
described 2-110
examples 2-110
using 2-110
described 2-113
examples 2-114
syntax 2-113
using 2-113
examples 2-116
using 2-115
described 2-115
syntax 2-115
described 2-118
examples 2-118
using 2-118
show inventory command 2-118
described 2-123
examples 2-123
related commands 2-123
using 2-123
described 2-124
examples 2-124
syntax 2-124
described 2-127
examples 2-127
related commands 2-128
syntax 2-127
using 2-127
described 2-131
examples 2-131
related commands 2-131
syntax 2-131
using 2-131
described 2-129
examples 2-129
related commands 2-130
described 2-132
syntax 2-132
described 2-137
examples 2-138
syntax 2-137
using 2-137
varlog files 2-138
described 2-139
examples 2-139
related commands 2-139
described 2-140, 2-141
examples 2-140, 2-141
related commands 2-140, 2-142
syntax 2-140
using 2-140, 2-141
described 2-143
examples 2-143
related commands 2-144
syntax 2-143
using 2-143
described 2-145
examples 2-145
using 2-145
signature-definition name described 2-70
described 2-148
examples 2-149
related commands 2-149
syntax 2-148
using 2-148
described 2-150
examples 2-150
related commands 2-150
using 2-150
described 2-151
examples 2-152
related commands 2-152
syntax 2-151
using 2-151
starting IP logging 2-41
clearing 2-132
viewing 2-132
status events viewing 2-99
syntax case sensitivity 1-3
System Configuration Dialog 2-75
system information exporting to FTP or SCP server 2-137
system viewing status 2-137
tab completion using 1-3
control transaction responses 2-137
current configuration information 2-137
debug logs 2-137
version 2-137
described 2-153
examples 2-153
syntax 2-153
using 2-153
terminating a CLI session 2-19
described 2-154
examples 2-154
related commands 2-154
described 2-155, 2-157
examples 2-155, 2-157
related commands 2-156, 2-158
syntax 2-155, 2-157
using 2-155, 2-157
described 2-159
examples 2-159
using 2-159
unlocking user accounts 2-162
described 2-162
examples 2-162
related commands 2-162
syntax 2-162
using 2-162
updating the password 2-61
described 2-160
examples 2-161
syntax 2-160
using 2-160
upgrading the system 2-160
described 2-163
examples 2-163
related commands 2-164
syntax 2-163
using 2-163
administrator 1-1
operator 1-1
service 1-1
viewer 1-1
anomaly detection file 2-5
banner login 2-8
clear denied-attackers 2-16, 2-31
clear os-identification 2-21
copy ad-knowledge-base 2-28
copy instance 2-30
erase ad-knowledge-base 2-37
erase license-key 2-39
list component-configurations 2-45
rename ad-knowledge-base 2-68
show inspection-load 2-110
validation error messages described C-4
viewer privileges 1-2
alerts 2-99
block requests 2-99
error events 2-99
IPS processes 2-145
operating system 2-145
signature packages 2-145
status events 2-99