O'Reilly logo

Network Security Principles and Practices by Saadat Malik

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Components of the Cisco Secure IDS

Cisco currently provides IDSs in two flavors—network intrusion detection and host intrusion detection. Generally, it is advisable to start by implementing IDS in a network using the network-based variety because it has less impact on the network bandwidth and also doesn't consume CPU resources on individual servers. As soon as the network IDS is operational, based on specific requirements for servers that need to be protected from attacks, host IDS can be implemented on specific machines.

This chapter concentrates on Cisco's network-based intrusion detection. You are encouraged to look at the following URL for details on the host IDS:

cco/univercd/cc/td/doc/product/iaabu/csids/host/index.htm

Cisco's intrusion ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required