Case Studies
This section looks at some common ways of deploying IDS solutions in a network. We will look at how the sensors are set up and talk about how the management console is used to communicate with them. The idea is to give you insight into the setup of common IDS configurations.
Using a Router as a Sensor Device
This case study sets up a router to act as a sensor. The director used in this case study is a UNIX director, but CSPM could have been used as effectively in this role. The router is set up to do a number of things, including excluding signatures from being processed and filtering setup so that alarms are not generated due to traffic going to and from certain hosts for certain signatures.The reason for excluding certain signatures ...
Get Network Security Principles and Practices now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.