O'Reilly logo

Network Administrators Survival Guide by CCIE No. 10401 Anand Deveriya

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Intrusion Detection System (IDS)

This chapter covers deploying an intrusion detection system (IDS) in a Cisco network. The chapter is comprised of the following three sections:

IDS Overview

An IDS monitors traffic within a network to detect unauthorized network activity. After detecting malicious activity, the IDS sends an alert message to a central monitoring console so that action can be taken by the Netadmin. The alerts are sent in the form of syslog messages or pager/e-mail alerts. IDSs are available as appliances (hardware-based devices) as well as software-based agents. The hardware systems are ready to be deployed within the network, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required