C-1. Intrusion Detection System Module

  • The IDSM can analyze a data stream and recognize intrusions or malicious activity based on a set of attack signatures.

  • The IDSM can monitor up to 100 Mbps of data. If the data rate rises above that maximum, some packets will be lost and attacks could go unrecognized.

  • You can subscribe to receive IDS bulletins describing new signature updates, service packs, or product news. Enter your email address and a password at www.cisco.com/warp/public/779/largeent/it/ids_news/subscribe.html.

  • The IDSM has two logical switch ports: a capture or “sniffing” port (port 1), and a control port (port 2).

  • Monitored traffic must be sent to the capture port. Only the VLANs of which that capture port is a member can be monitored. ...

Get Cisco® Field Manual: Catalyst® Switch Configuration now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.