The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Index
an entry to the known hosts table 2-163
a public key 2-160
a trusted host 2-167, 2-169
administrator privileges 1-1
alerts viewing 2-105
loading 2-4
saving 2-5
using 2-5
described 2-4
examples 2-4
syntax 2-4
anomaly-detection name described 2-76
described 2-5
examples 2-5
syntax 2-5
application partition reimaging 2-73
immediate updates 2-8
service packs 2-172
signature updates 2-172
attacker IP address removing 2-18
described 2-6
examples 2-6
related commands 2-7
syntax 2-6
using 2-6
described 2-8
using 2-8
described 2-10
examples 2-10
using 2-10
banner message creating 2-10
block requests viewing 2-105
capturing live traffic 2-65
changing the password 2-68
described 2-18
examples 2-18, 2-35
syntax 2-18, 2-34
using 2-18, 2-34
described 2-20
examples 2-20, 2-112
using 2-20, 2-112
described 2-21
examples 2-21
syntax 2-21
using 2-21
described 2-23
examples 2-24, 2-25
syntax 2-23
using 2-23
described 2-25
command line editing 1-4
command modes 1-5
default keywords 1-8
error messages A-1
generic commands 1-7
regular expression syntax 1-5
case sensitivity 1-3
described 1-2
display options 1-4
help 1-3
prompts 1-2
recall 1-3
tab completion 1-3
described 2-26
examples 2-26
syntax 2-26
using 2-26
closing an active terminal session 2-44
command line editing (table) 1-4
described 1-5
event action rules configuration 1-5
EXEC 1-5
global configuration 1-5
privileged EXEC 1-5
service mode configuration 1-5
signature definition configuration 1-5
viewing list of most recently used 2-113
described 2-27
examples 2-27
syntax 2-27
using 2-27
described 2-28
examples 2-29
syntax 2-28
using 2-28
described 2-31
examples 2-31
syntax 2-31
using 2-31
configuration files 2-28
iplogs 2-28
described 2-33
examples 2-33
syntax 2-33
using 2-33
banner message 2-10
users 2-175
Ctrl-N 1-3
Ctrl-P 1-3
default keywords using 1-8
deleting a logical file 2-40
denied attackers removing 2-18
directing output to the serial connection 2-36
current level of privilege 2-132
historical interface statistics 2-121
interface statistics 2-119
IP log contents 2-47
IP packet route 2-171
known hosts table 2-143
LACP information 2-127
live traffic 2-65
local event log contents 2-105
PEP information 2-125
public RSA keys 2-136, 2-137, 2-139
sensor trusted hosts 2-152, 2-153
server TLS certificate fingerprint 2-151
specific number of lines on screen 2-165
SSH server host key 2-141
statistics 2-144
system clock 2-102
user information 2-155
version information 2-157
described 2-36
examples 2-36
using 2-36
described 2-37
examples 2-37
related commands 2-38
described 2-39
examples 2-39
global configuration 2-27
service configuration mode 2-76
described 2-40
examples 2-40
syntax 2-40
using 2-40
described 2-41
examples 2-41
syntax 2-41
using 2-41
described 2-43
examples 2-43
using 2-43
error events viewing 2-105
described A-1
validation A-5
event-action-rules name described 2-76
event log viewing contents of 2-105
clearing 2-20
deleting 2-20
Event Store clearing events 2-20, 2-112
described 2-44
examples 2-44
using 2-44
configuration mode 2-39, 2-44
submodes 2-39
loading 2-4
saving 2-5
server host key 2-162
X.509 certificate 2-166
generic commands 1-7
question mark 1-3
using 1-3
initializing the sensor 2-80
described 2-45
examples 2-46
related commands 2-46
syntax 2-45
using 2-45
described 2-47
examples 2-48
syntax 2-47
using 2-47
IP packet display route 2-171
default 1-8
no 1-8
limitations for concurrent CLI sessions 1-1
described 2-49, 2-50, 2-51
examples 2-49, 2-50, 2-51
using 2-49, 2-50, 2-51
locking user accounts 2-6
privilege level 2-72
terminal properties for a login session 2-165
monitoring viewer privileges 1-2
described 2-59
examples 2-59
related commands 2-62
syntax 2-59
using 2-59
described 2-63
related commands 2-64
network connectivity testing for 2-70
operator privileges 1-2
clearing current line 1-4
displaying 1-4
setting number of lines to display 2-165
described 2-65
examples 2-66
related commands 2-67
syntax 2-65
using 2-66
changing 2-68
described 2-68
examples 2-69
related commands 2-69
syntax 2-68
updating 2-68
using 2-68
described 2-70
examples 2-70
syntax 2-70
using 2-70
platforms concurrent CLI sessions 1-1
described 2-72
examples 2-72
modifying 2-72
related commands 2-72
syntax 2-72
prompts default input 1-2
help and tab completion 1-3
using 1-3
described 2-73
examples 2-73
syntax 2-73
using 2-73
described 1-5
table 1-6
service packs 2-37
signature updates 2-37
described 2-74
examples 2-74
syntax 2-74
using 2-74
described 2-75
examples 2-75
syntax 2-75
using 2-75
route displaying IP packet 2-171
analysis-engine 2-76
anomaly-detection name 2-76
authentication 2-76
described 2-76
event-action-rules name 2-76
examples 2-78
external-product-interface 2-76
host 2-76
interface 2-76
logger 2-76
network-access 2-76
notification 2-76
privileges 1-2
role 1-2
signature-definition name 2-76
ssh-known-hosts 2-76
syntax 2-76
trusted-certificate 2-76
using 1-2, 2-78
web-server 2-76
setting the system clock 2-26
clock setting parameters (table) 2-82
described 2-80
examples 2-82
using 2-81
described 2-100
examples 2-100
syntax 2-100
using 2-100
authoritative flags 2-102
described 2-102
examples 2-102
syntax 2-102
using 2-102
described 2-105
examples 2-106
syntax 2-105
using 2-106
described 2-108
examples 2-108
related commands 2-111
syntax 2-108
using 2-108
described 2-113
examples 2-113
using 2-113
described 2-114
examples 2-114
related commands 2-114
using 2-114
described 2-116
examples 2-116
using 2-116
described 2-119
examples 2-120
syntax 2-119
using 2-119
examples 2-122
using 2-121
described 2-121
examples 2-123
syntax 2-121
described 2-125
examples 2-125
using 2-125
described 2-127
using 2-127
show lacp internals (examples) 2-127
show lacp neighbors (examples) 2-127
described 2-132
examples 2-132
related commands 2-132
using 2-132
described 2-133
examples 2-133
syntax 2-133
described 2-136, 2-137, 2-139
examples 2-136, 2-137, 2-139
related commands 2-136, 2-138, 2-140
syntax 2-139
using 2-136, 2-137, 2-139
described 2-143
examples 2-143
related commands 2-143
syntax 2-143
using 2-143
described 2-141
examples 2-141
related commands 2-142
described 2-144
syntax 2-144
examples 2-150
syntax 2-149
using 2-149
varlog files 2-150
described 2-151
examples 2-151
related commands 2-151
described 2-152, 2-153
examples 2-152, 2-153
related commands 2-152, 2-154
syntax 2-152
using 2-152, 2-153
described 2-155
examples 2-155
related commands 2-156
syntax 2-155
using 2-155
described 2-157
examples 2-157
using 2-157
signature-definition name described 2-76
described 2-160
examples 2-161
related commands 2-161
syntax 2-160
using 2-160
described 2-162
examples 2-162
related commands 2-162
using 2-162
described 2-163
examples 2-164
related commands 2-164
syntax 2-163
using 2-163
starting IP logging 2-45
clearing 2-144
viewing 2-144
status events viewing 2-105
syntax case sensitivity 1-3
System Configuration Dialog 2-81
system viewing status 2-149
tab completion using 1-3
control transaction responses 2-149
current configuration information 2-149
debug logs 2-149
version 2-149
described 2-165
examples 2-165
syntax 2-165
using 2-165
terminating a CLI session 2-21
described 2-166
examples 2-166
related commands 2-166
described 2-167, 2-169
examples 2-167, 2-169
related commands 2-168, 2-170
syntax 2-167, 2-169
using 2-167, 2-169
described 2-171
examples 2-171
using 2-171
unlocking user accounts 2-174
described 2-174
examples 2-174
related commands 2-174
syntax 2-174
using 2-174
updating the password 2-68
described 2-172
examples 2-8, 2-173
syntax 2-172
using 2-172
upgrading the system 2-172
described 2-175
examples 2-175
related commands 2-176
syntax 2-175
using 2-175
administrator 1-1
operator 1-1
service 1-1
viewer 1-1
anomaly detection file 2-5
banner login 2-10
clear denied-attackers 2-18, 2-34
clear os-identification 2-23
copy ad-knowledge-base 2-31
copy instance 2-33
erase ad-knowledge-base 2-41
erase license-key 2-43
list component-configurations 2-49, 2-50, 2-51
rename ad-knowledge-base 2-74
show inspection-load 2-116
validation error messages described A-5
viewer privileges 1-2
alerts 2-105
block requests 2-105
error events 2-105
IPS processes 2-157
operating system 2-157
signature packages 2-157
status events 2-105