O'Reilly logo

Cisco Router Firewall Security by Richard A. Deal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 16. Intrusion-Detection System

Part VI, “Managing Access Through Routers,” covered Cisco IOS features and tools that you can use to manage traffic better as it travels through your router. That part focused primarily on authentication: lock-and-key ACLs, authentication proxy, and routing authentication with MD5. This part focuses on detecting and, in some cases, preventing certain kinds of attacks, as well as logging information to help you determine when and how an attack occurred.

This chapter focuses on the capability of the Cisco IOS to detect attacks with the intrusion-detection system (IDS) feature of the Cisco IOS Firewall. The following topics are covered in this chapter:

IDS introduction

IDS signatures

Cisco router IDS ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required