Summary

In this chapter, you examined the intrusion detection capabilities of the Cisco IOS software and the Cisco Secure PIX Firewall. Both of these devices run 59 signatures that represent the most common network-based intrusion issues found in today's networks. The chapter started by looking at how Cisco IOS software and the PIX handle IDS. Next you saw the 59 default signatures that the Cisco IOS software IDS and PIX Firewall IDS use. You then covered the configuration steps necessary to configure the IDS functionality in Cisco IOS and the Cisco Secure PIX Firewall.

Get CCIE Practical Studies: Security (CCIE Self-Study) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.