Index
an entry to the known hosts table 2-159
a public key 2-156
a trusted host 2-163
administrator privileges 1-1
alerts viewing 2-105
loading 2-4
saving 2-5
using 2-5
described 2-4
examples 2-4
syntax 2-4
anomaly-detection name described 2-74
described 2-5
examples 2-5
syntax 2-5
application partition reimaging 2-71
immediate updates 2-8
service packs 2-166
signature updates 2-166
attacker IP address removing 2-18
described 2-6
examples 2-6
related commands 2-7
syntax 2-6
using 2-6
described 2-8
using 2-8
described 2-10
examples 2-10
using 2-10
banner message creating 2-10
block requests viewing 2-105
capturing live traffic 2-63
changing the password 2-66
described 2-18
examples 2-18, 2-35
syntax 2-18, 2-34
using 2-18, 2-34
described 2-20
examples 2-20, 2-112
using 2-20, 2-112
described 2-21
examples 2-21
syntax 2-21
using 2-21
described 2-23
examples 2-24, 2-25
syntax 2-23
using 2-23, 2-25
described 2-25
syntax 2-25
command line editing 1-4
command modes 1-5
default keywords 1-8
error messages A-1
generic commands 1-7
regular expression syntax 1-5
case sensitivity 1-3
described 1-2
display options 1-4
help 1-3
prompts 1-2
recall 1-3
tab completion 1-3
described 2-26
examples 2-26
syntax 2-26
using 2-26
closing an active terminal session 2-44
command line editing (table) 1-4
described 1-5
event action rules configuration 1-5
EXEC 1-5
global configuration 1-5
privileged EXEC 1-5
service mode configuration 1-5
signature definition configuration 1-5
viewing current sensor configuration 2-102
viewing IPS health and security status 2-112
viewing list of most recently used 2-113
described 2-27
examples 2-27
syntax 2-27
using 2-27
described 2-28
examples 2-29
syntax 2-28
using 2-28
described 2-31
examples 2-31
syntax 2-31
using 2-31
configuration files 2-28
iplogs 2-28
described 2-33
examples 2-33
syntax 2-33
using 2-33
banner message 2-10
users 2-169
Ctrl-N 1-3
Ctrl-P 1-3
default keywords using 1-8
deleting a logical file 2-40
denied attackers removing 2-18
directing output to the serial connection 2-36
current level of privilege 2-129
historical interface statistics 2-121
interface statistics 2-119
IP log contents 2-47
IP packet route 2-165
known hosts table 2-140
live traffic 2-63
local event log contents 2-105
PEP information 2-125
public RSA keys 2-133, 2-134, 2-136
sensor trusted hosts 2-150
server TLS certificate fingerprint 2-149
specific number of lines on screen 2-161
SSH server host key 2-138
statistics 2-141
system clock 2-100
user information 2-151
version information 2-153
described 2-36
examples 2-36
using 2-36
described 2-37
examples 2-37
related commands 2-38
described 2-39
examples 2-39
global configuration 2-27
service configuration mode 2-74
described 2-40
examples 2-40
syntax 2-40
described 2-41
examples 2-41
syntax 2-41
using 2-41
described 2-43
examples 2-43
using 2-43
error events viewing 2-105
described A-1
validation A-5
event-action-rules name described 2-74
event log viewing contents of 2-105
clearing 2-20
deleting 2-20
Event Store clearing events 2-20, 2-112
described 2-44
examples 2-44
using 2-44
configuration mode 2-39, 2-44
submodes 2-39
loading 2-4
saving 2-5
server host key 2-158
X.509 certificate 2-162
generic commands 1-7
question mark 1-3
using 1-3
initializing the sensor 2-78
described 2-45
examples 2-46
related commands 2-46
syntax 2-45
using 2-45
described 2-47
examples 2-48
syntax 2-47
using 2-47
IP packet display route 2-165
default 1-8
no 1-8
limitations for concurrent CLI sessions 1-1
described 2-49
examples 2-49
using 2-49
locking user accounts 2-6
privilege level 2-70
terminal properties for a login session 2-161
monitoring viewer privileges 1-2
described 2-56
examples 2-56
related commands 2-60
syntax 2-56
using 2-56
described 2-61
related commands 2-62
network connectivity testing for 2-68
operator privileges 1-2
clearing current line 1-4
displaying 1-4
setting number of lines to display 2-161
described 2-63
examples 2-64
related commands 2-65
syntax 2-63
using 2-64
changing 2-66
described 2-66
examples 2-67
related commands 2-67
syntax 2-66
updating 2-66
using 2-66
described 2-68
examples 2-68
syntax 2-68
using 2-68
platforms concurrent CLI sessions 1-1
described 2-70
examples 2-70
modifying 2-70
related commands 2-70
syntax 2-70
prompts default input 1-2
help and tab completion 1-3
using 1-3
described 2-71
examples 2-71
syntax 2-71
using 2-71
described 1-5
table 1-6
service packs 2-37
signature updates 2-37
described 2-72
examples 2-72
syntax 2-72
using 2-72
described 2-73
examples 2-73
syntax 2-73
using 2-73
route displaying IP packet 2-165
analysis-engine 2-74
anomaly-detection name 2-74
authentication 2-74
described 2-74
event-action-rules name 2-74
examples 2-76
external-product-interface 2-74
host 2-74
interface 2-74
logger 2-74
network-access 2-74
notification 2-74
privileges 1-2
role 1-2
signature-definition name 2-74
ssh-known-hosts 2-74
syntax 2-74
trusted-certificate 2-74
using 1-2, 2-76
web-server 2-74
setting the system clock 2-26
clock setting parameters (table) 2-80
described 2-78
examples 2-80
using 2-79
described 2-98
examples 2-98
syntax 2-98
using 2-98
authoritative flags 2-100
described 2-100
examples 2-100
syntax 2-100
using 2-100
described 2-102
examples 2-102
described 2-105
examples 2-106
syntax 2-105
using 2-106
described 2-108
examples 2-108
related commands 2-111
syntax 2-108
using 2-108
described 2-112
described 2-113
examples 2-113
using 2-113
described 2-114
examples 2-114
related commands 2-114
using 2-114
described 2-116
examples 2-116
using 2-116
described 2-119
examples 2-120
syntax 2-119
using 2-119
examples 2-122
using 2-121
described 2-121
examples 2-123
syntax 2-121
described 2-125
examples 2-125
using 2-125
described 2-129
examples 2-129
related commands 2-129
using 2-129
described 2-130
examples 2-130
syntax 2-130
described 2-133, 2-134, 2-136
examples 2-133, 2-134, 2-136
related commands 2-133, 2-135, 2-137
syntax 2-136
using 2-133, 2-134, 2-136
described 2-140
examples 2-140
related commands 2-140
syntax 2-140
using 2-140
described 2-138
examples 2-138
related commands 2-139
described 2-141
syntax 2-141
examples 2-148
syntax 2-147
using 2-148
varlog files 2-148
described 2-149
examples 2-149
related commands 2-149
described 2-150
examples 2-150
related commands 2-150
syntax 2-150
using 2-150
described 2-151
examples 2-151
related commands 2-152
syntax 2-151
using 2-151
described 2-153
examples 2-153
using 2-153
signature-definition name described 2-74
described 2-156
examples 2-156
related commands 2-157
syntax 2-156
using 2-156
described 2-158
examples 2-158
related commands 2-158
using 2-158
described 2-159
examples 2-160
related commands 2-160
syntax 2-159
using 2-159
starting IP logging 2-45
clearing 2-141
viewing 2-141
status events viewing 2-105
syntax case sensitivity 1-3
System Configuration Dialog 2-79
system viewing status 2-147
tab completion using 1-3
control transaction responses 2-147
current configuration information 2-147
debug logs 2-147
version 2-147
described 2-161
examples 2-161
syntax 2-161
using 2-161
terminating a CLI session 2-21
described 2-162
examples 2-162
related commands 2-162
described 2-163
examples 2-163
related commands 2-164
syntax 2-163
using 2-163
described 2-165
examples 2-165
using 2-165
unlocking user accounts 2-168
described 2-168
examples 2-168
related commands 2-168
syntax 2-168
using 2-168
updating the password 2-66
described 2-166
examples 2-8, 2-167
syntax 2-166
using 2-166
upgrading the system 2-166
described 2-169
examples 2-169
related commands 2-170
syntax 2-169
using 2-169
administrator 1-1
operator 1-1
service 1-1
viewer 1-1
anomaly detection file 2-5
banner login 2-10
clear denied-attackers 2-18, 2-34
clear os-identification 2-23, 2-25
copy ad-knowledge-base 2-31
copy instance 2-33
erase ad-knowledge-base 2-41
erase license-key 2-43
list component-configurations 2-49
rename ad-knowledge-base 2-72
show inspection-load 2-116
validation error messages described A-5
viewer privileges 1-2
alerts 2-105
block requests 2-105
error events 2-105
IPS processes 2-153
operating system 2-153
signature packages 2-153
status events 2-105