O'Reilly logo

Cisco Router and Switch Forensics by Dale Liu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Collecting the Non-Volatile Data from a Router

Solutions in this chapter:

▪ Before You Connect to the Cisco Router
▪ Connecting to the Cisco Router
▪ Router Non-Volatile Data Collection Procedures
▪ Router Commands to Run on theCisco Router
▪ Analysis of Gathered Non-Volatile Router Data from a Cisco Router
▪ The Incident
Summary
Solutions Fast Track
Frequently Asked Questions

Introduction

When you think about network security issues today, immediate thoughts of the many credit card and personal information disclosures that seem to be highlighted as a regular occurrence in the media come to mind. Routers are rarely if ever mentioned as having played any part in a high-profile cybercrime incident.
Routers most often silently play a large part ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required