I have IDS devices running under version 3.1(4), I have connected some of them to the IDS MC and it working fine. But for some reason I four IDS at different location does not running WebServer (so I can NOT brows to the IDS using https://IP). I already opened a case with Cisco but we could not get a final solution YET!!...
Also, keep in mind that I have reviewed the configuration on these IDS sensor and it is correct and as far as signature update, it is running under the newest version which is (S 58).
Logon to the sensor as root, run the command sysconfig-sensor, choose option 6, go through the postoffice settings for the sensor, when it prompts with the question "Do you want to use IDM for management?" choose Yes. Exit out of the utility.
also make sure that https is allowed all the way between the client host and the sensor.
I ran Sysconfig-sensro, then option number (6), then type (Y) when it prompt with [WEB based Inrustion Detection Device Manager (Y/N)?].
then it shows some configuration (which all correct)then I typed (Y)
then Making the IDs Daemon ......... Press Enter to continue .
Then it shows the following NOTE:
** This script does not tell the IDS Manager how to comunicate with the Sensor. Consult the User's Guid for information about how to add a new sensor machiene to an existing IDS Manager configuration.**
Also, I ran these command [netstat -a] to check if the port 443 enable or not, but what I found is only (FTP, Telnet and 22) there is no 443 at all.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :