Summary

[ LiB ]  

You have seen in this chapter how Cisco IDS alarms, signatures, signature engines, and their parameters work together to create a robust intrusion-detection solution. Alarms can be summarized to work optimally in your network environment, and you can use signature engines to add the set of comprehensive series of default signatures. When choosing a signature engine to create your custom signature, you should consider the network protocol, target address, port range, type of attack, and payload inspection.

[ LiB ]  


CSIDS Exam Cram 2 (Exam 642-531)
CSIDS Exam Cram 2 (Exam 642-531)
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 213

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net