Cisco IOS Software and PIX IDS Signatures
The Cisco Network Security Database contains a comprehensive list of intrusion detection signatures. The Cisco Secure Intrusion Detection System (CSIDS) range of sensors and modules uses the full list of signatures.
The Cisco IOS software IDS and Cisco Secure PIX Firewall IDS use a cut-down number of intrusion detection signatures from the Network Security Database. These signatures are representative of the most common network attacks and information-gathering scans that are commonly found in an operational network.
The Cisco IOS software and PIX Firewall IDS software were designed with flexibility in mind. This allows individual signatures to be disabled where false positives exist.
Table 24-1 is a ...
Get CCIE Practical Studies: Security (CCIE Self-Study) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.