“Any product that needs a manual to work is broken.”
The focus of this book has been providing readily available tools such as open source applications for the average network engineer. This chapter addresses what is available using open source tools supported by Cisco and tools from the Cisco enterprise security catalog. This includes technology that generates logs, solutions that can be leveraged during an incident response situation, and ways to access data in general using Cisco products such as routers and switches. We highlight each product’s security features but do not go into great detail because you can find that information on the Cisco website.
We first touch on Cisco’s history and ...