Cisco Security Professionals Guide To Secure Intrusion by Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido

By Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky

Cisco structures, Inc. is the global chief in networking for the web, and its Intrusion Detection platforms line of goods is making in roads within the IDS marketplace phase, with significant enhancements having occurred in February of 2003.
A entire, updated consultant to the and software program that include the Cisco IDS. This ebook does greater than convey community engineers the best way to arrange and deal with this line of most sensible promoting items ... it walks them step-by-step via all of the targets of the Cisco safe Intrusion Detection process direction (and corresponding examination) that community engineers needs to go on their option to reaching sought-after CCSP certification.
* deals whole insurance of the Cisco safe Intrusion Detection structures examination (CSIDS 9E0-100) for CCSPs

Show description

Read Online or Download Cisco Security Professionals Guide To Secure Intrusion Detection Systems Ebook PDF

Similar networking books

802.1X Port-Based Network Access Authentification

Written to entice a huge viewers, 802. 1X Port-Based Authentication seeks to outline this complicated thought in obtainable phrases and to discover its numerous purposes to modern day desktop networks utilizing this actual community protocol. this article assumes that the reader can have very little previous wisdom and just a normal figuring out of machine networking, providing an introductory review in addition to a subject matter assessment in every one bankruptcy.

Extra resources for Cisco Security Professionals Guide To Secure Intrusion Detection Systems Ebook

Example text

Once the initialization process is complete and you have become familiar with the accounts and commands they perform, we will take you through the process of how to recover the sensor using a recovery partition CD-ROM. You may even need to know how to recover passwords. Thus, we'll discuss how to get past the dreaded unknown password of a used sensor. These two processes are important to know, considering frequent personnel turnover and how often hardware changes hands. As a result, information like passwords is not always passed on to the next responsible party.

The RDEP protocol is simpler and easier to manage than the PostOffice Protocol. It uses well-known TCP port 443 by default for quick firewall rule set modification. When configuring RDEP communications, administrators will need to provide a device name for the sensor, whether they intend to use encryption for communication, and on what port they wish to run the service. Deploying Cisco IDS Sensors In the first chapter, we briefly discussed some of the best practices related to planning and managing the implementation of IDS sensors.

VMS has several modules itself. 1 are required from IDS management. Because security devices (such as IDS) transport potentially sensitive data, secure techniques, such as SSH, IEV, or IDM, should be used to monitor and maintain the security infrastructure. Cisco has also developed two protocols by which IDS equipment can be managed, PostOffice Protocol and Remote Data Exchange Protocol (RDEP). We'll discuss both of these protocols next. Cisco PostOffice Protocol To manage and maintain the Cisco IDS devices, Cisco first developed a proprietary protocol known as PostOffice Protocol.

Download PDF sample

Rated 4.62 of 5 – based on 29 votes