Chapter 8. Collecting the Non-Volatile Data from a Router
Solutions in this chapter:
▪ Before You Connect to the Cisco Router
▪ Connecting to the Cisco Router
▪ Router Non-Volatile Data Collection Procedures
▪ Router Commands to Run on theCisco Router
▪ Analysis of Gathered Non-Volatile Router Data from a Cisco Router
▪ The Incident
Summary
Solutions Fast Track
Frequently Asked Questions
Introduction
When you think about network security issues today, immediate thoughts of the many credit card and personal information disclosures that seem to be highlighted as a regular occurrence in the media come to mind. Routers are rarely if ever mentioned as having played any part in a high-profile cybercrime incident.
Routers most often silently play a large part ...
Get Cisco Router and Switch Forensics now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.