The answer is yes, but it is an XML documet that is quite large. The file is located in /usr/cids/idsRoot/etc/VS-Config and is called virtualSensor.xml. All of the information you are looking for is in this file and more. You can skip down to the part of the file that is delineated with the tag.
You would either need to purchase or download a free XML parser from somewhere on the Internet; or use the CLI of the IDS sensor itself.
In the CLI of the sensor you can enter the following commands:
service virtual-sensor-configuration virtualSensor
The above "show settings" command will parse that file and show it to you in a readable format.
NOTE: If you are only interested in certain lines like the AlarmSeverity then you can use the include option to limit what is shown (separate the keywords you want to see by a "|"):
"show settings | include SIGID|AlarmSeverity"
NOTE2: Also the "show settings" command is available in other sub-modes as well. So you can enter the other sub-modes like ATOMIC.ICMP to limit your output to just alarms in the ATOMIC.ICMP engine.
Many users are just interested in the changes that they have made from the default configuration.
To see just the changes you can just type "show configuration". It will parse through the signature file as well as the other configuration files on the sensor and just show you what is different from the default configuration.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :