E-41
Cisco Intrusion Prevention System Appliance Hardware Installation Guide for IPS 7.1
OL-24002-01
Appendix E Troubleshooting
Troubleshooting the Appliance
password: <hidden>
username: netrangr default:
-----------------------------------------------
-----------------------------------------------
cat6k-devices (min: 0, max: 250, current: 0)
-----------------------------------------------
-----------------------------------------------
router-devices (min: 0, max: 250, current: 1)
-----------------------------------------------
ip-address: 10.89.147.54
-----------------------------------------------
communication: telnet default: ssh-3des
nat-address: 0.0.0.0 <defaulted>
profile-name: r7200
block-interfaces (min: 0, max: 100, current: 1)
-----------------------------------------------
interface-name: fa0/0
direction: in
-----------------------------------------------
pre-acl-name: <defaulted>
post-acl-name: <defaulted>
-----------------------------------------------
-----------------------------------------------
-----------------------------------------------
-----------------------------------------------
firewall-devices (min: 0, max: 250, current: 0)
-----------------------------------------------
-----------------------------------------------
sensor(config-net)#
Step 3 Manually connect to the device to make sure you have used the correct username, password, and enable
password, and to ensure that the device is reachable from the sensor:
a. Log in to the service account.
b. Telnet or SSH to the network device to verify the configuration.
c. Make sure you can reach the device.
d. Verify the username and password.
Step 4 Verify that each interface and direction on each network device is correct.
For More Information
For the procedure for verifying the interfaces and directions for each network device, see Verifying the
Interfaces and Directions on the Network Device, page E-41.
Verifying the Interfaces and Directions on the Network Device
To verify that each interface and direction on each controlled device is correct, you can send a manual
block to a bogus host and then check to see if deny entries exist for the blocked addresses in the ACL of
the router.
To perform a manual block using IDM, choose Monitoring > Sensor Monitoring > Time-Based
Actions > Host Blocks. To perform a manual block using IME, choose Configuration >
sensor_name > Sensor Monitoring > Time-Based Actions > Host Blocks.
Comments to this Manuals