O'Reilly logo

CCIE Practical Studies: Security (CCIE Self-Study) by Raymond Morrow, Andrew G. Mason, Dmitry Bokotey

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Cisco IOS Software and PIX IDS Signatures

The Cisco Network Security Database contains a comprehensive list of intrusion detection signatures. The Cisco Secure Intrusion Detection System (CSIDS) range of sensors and modules uses the full list of signatures.

The Cisco IOS software IDS and Cisco Secure PIX Firewall IDS use a cut-down number of intrusion detection signatures from the Network Security Database. These signatures are representative of the most common network attacks and information-gathering scans that are commonly found in an operational network.

The Cisco IOS software and PIX Firewall IDS software were designed with flexibility in mind. This allows individual signatures to be disabled where false positives exist.

Table 24-1 is a ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required