O'Reilly logo

Network Security Principles and Practices by Saadat Malik

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Case Studies

This section looks at some common ways of deploying IDS solutions in a network. We will look at how the sensors are set up and talk about how the management console is used to communicate with them. The idea is to give you insight into the setup of common IDS configurations.

Using a Router as a Sensor Device

This case study sets up a router to act as a sensor. The director used in this case study is a UNIX director, but CSPM could have been used as effectively in this role. The router is set up to do a number of things, including excluding signatures from being processed and filtering setup so that alarms are not generated due to traffic going to and from certain hosts for certain signatures.The reason for excluding certain signatures ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required