Chapter 3. Intrusion Detection Concepts

Upon completion of this chapter, you will be able to perform the following tasks:

  • Describe the basic types of devices used to capture traffic for your IDS sensors

  • Explain the commands used to monitor network traffic using SPAN

  • Explain the difference between using SPAN and RSPAN

  • Explain the commands used to monitor network traffic using VACLs

  • Identify the steps used to define a VACL

Before deploying an intrusion detection system (IDS), you must understand the benefits that an IDS provides. An IDS is software and possibly hardware that detects attacks against your network. Besides detecting attacks, most IDSs also provide some type of active response to the attacks, such as resetting TCP connections and updating ...

Get CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.