Cisco has translated this document using a combination of machine and human technologies to offer our users around the world Support content in their own language.Please note that even the best machine translation will not be as accurate as that provided by a professional translator.Cisco Systems, Inc. assumes no liability for the accuracy of these translations and recommends that the original English document (link provided) is always consulted.
SSP-60# autoupdatenow Warning: Executing this command will perform an auto-upgrade on the sensor immediately. Before executing this command, you must have a valid license to apply the Signature AutoUpdates and auto-upgrade settings configured.After executing this command please disable user-server/cisco-server inside 'auto-upgrade' settings, if you don't want scheduled auto-updates Continue? : yes Automatic Update for the sensor has been executed.Use 'show statistics host' command to check the result of auto-update.Please disable user-server/cisco-server in auto-upgrade settings, if you don't want scheduled auto-updates
Cisco Intrusion Prevention System, Version 7.3(2)E4
Host: Realm Keys key1.0 Signature Definition: Signature Update S805.0 2014-06-03 Threat Profile Version 7 OS Version: 220.127.116.11 Platform: ASA5585-SSP-IPS60 Serial Number: JAF1527CPNK Licensed, expires: 21-Jun-2014 UTC Sensor up-time is 39 days. Using 46548M out of 48259M bytes of available memory (96% usage) system is using 32.4M out of 160.0M bytes of available disk space (20% usage) application-data is using 86.6M out of 377.5M bytes of available disk space (24% usage) boot is using 63.4M out of 70.5M bytes of available disk space (95% usage) application-log is using 494.0M out of 513.0M bytes of available disk space (96% usage)
IPS# show interfaces <Output truncated> MAC statistics from interface Management0/0 Interface function = Command-control interface Description = Media Type = TX Default Vlan = 0 Link Status = Up <--- <Output truncated>
为了验证CCO用户帐户是否有必要的权限下载签名更新包，请打开Web浏览器并且登陆对与此同样CCO帐户的Cisco.com。一旦验证，请手工下载最新的IPS签名包。手工下载包的无法可能归结于缺乏用户帐户的关联对一有效Cisco Services for IPS订阅。另外，对security software的访问在CCO限制给接受每年加密/出口协议的授权用户。疏忽审批此协议被认识防止签名下载IDM/IME/CSM。为了验证此协议是否接受，请打开浏览器和登录对与同一个CCO帐户的Cisco.com。一旦验证，尝试手工下载Cisco IOS ？有K9特性组的软件包。