O'Reilly logo

CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) by Earl Carter

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Sensor Configuration

Upon completion of this chapter, you will be able to perform the following tasks:

  • Identify the basic sensor configuration tasks

  • Understand how to add users to your sensors

  • Understand how to configure time on your sensors

  • Identify the types of remote access to your sensors

  • Understand how to configure remote access to your sensors

  • Identify the basic Secure Shell (SSH) parameters

  • Understand how to add sensors to Management Center for IDS Sensors (IDS MC)

When using Cisco IDS on your network, you need to perform various configuration tasks on your sensors. Although you can perform these operations via the sensor's command-line interface (CLI), you can also perform these tasks using your Cisco management applications after ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required