Step Description Command Keys
3 Set the port to
connect to the edm
server.
esr (config-content-provider)# host
port <PORT>
<PORT> – number of sender TCP/UDP port,
takes values of [1..65535].
4 Set the type and
partition of the
external device to
create a crypto store.
esr (config-content-provider)# storage-
device <DEVICE>
<DEVICE> – label and partition name on the
external storage in the format of usb://
Partion_name:/
mmc://Partion_name:/
5 Set the time to
reboot the device
after receiving the
certificate.
esr (config-content-provider)# reboot
immediately | [time <HH:MM:SS>]
Restart the device after receiving the
certificate.
time <HH:MM:SS> – The time at which ESR
will reboot <hours:minutes:seconds>.
6 Enable content
provider.
enable
7 Set the interval for
accessing the edm
server in hours.
esr (config-content-provider)# upgrade
interval <1-240>
8 Specify description
(optional).
esr (config-content-provider)#
description edm
LINE (1-255) String describing server
9 Create IP addresses
lists which will be
used during filtration.
esr (config)# object-group network
<WORD>esr (config-object-group-
network)# ip prefix <ADDR/LEN>
<WORD> – server name, set by the string of
up to 32 characters.
<ADDR/LEN> – subnet, defined as
AAA.BBB.CCC.DDD/EE where each part
AAA-DDD takes values of [0..255] and EE
takes values of [1..32].
10 Enable service-ips on
interface.
esr (config)# interface gigabitethernet
1/0/Xesr (config-if-gi)# service-ips
enable
11 Create IPS/IDS
security policy.
esr (config)# security ips policy
WORD(1-31)
WORD(1-31)
12 Specify the IP
address profile that
IPS/IDS will protect.
esr(config-ips-policy)# protect
network-group <OBJ-GROUP-
NETWORK_NAME>
<OBJ-GROUP-NETWORK-NAME> –
protected IP addresses profile name, set by
the string of up to 32 characters.
13 Enter the vendor
configuration
section.
esr (config-ips-policy)# vendor
kaspersky