Chapter 11
Cisco Forensic Capabilities
“Any product that needs a manual to work is broken.”
—Elon Musk
The focus of this book has been providing readily available tools such as open source applications for the average network engineer. This chapter addresses what is available using open source tools supported by Cisco and tools from the Cisco enterprise security catalog. This includes technology that generates logs, solutions that can be leveraged during an incident response situation, and ways to access data in general using Cisco products such as routers and switches. We highlight each product’s security features but do not go into great detail because you can find that information on the Cisco website.
We first touch on Cisco’s history and ...
Get Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer, First Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.