The Cisco Network Security Database contains a comprehensive list of intrusion detection signatures. The Cisco Secure Intrusion Detection System (CSIDS) range of sensors and modules uses the full list of signatures.
The Cisco IOS software IDS and Cisco Secure PIX Firewall IDS use a cut-down number of intrusion detection signatures from the Network Security Database. These signatures are representative of the most common network attacks and information-gathering scans that are commonly found in an operational network.
The Cisco IOS software and PIX Firewall IDS software were designed with flexibility in mind. This allows individual signatures to be disabled where false positives exist.
Table 24-1 is a ...