© 2006 Cisco Systems, Inc. All rights reserved. SND v2.05-1 Securing Networks with Cisco IOS IPS Module Self-Check.

Презентация:



Advertisements
Похожие презентации
© 2006 Cisco Systems, Inc. All rights reserved. SND v Securing Networks with Cisco IOS IPS Configuring Cisco IOS IPS.
Advertisements

© 2001, Cisco Systems, Inc. CSIDS Chapter 9 Signature and Intrusion Detection Configuration.
© 2004, Cisco Systems, Inc. All rights reserved. CSIDS Course Agenda Day 1 Lesson 1Course Introduction Lesson 2Network Security and Cisco Lesson.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Module Summary IDS technology is passive; it monitors the network for suspicious activity and.
© 2006 Cisco Systems, Inc. All rights reserved. GWGK v Module Summary IP-to-IP gateways can be used to interconnect VoIP networks by allowing VoIP.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary The Cisco IOS Firewall feature set combines existing Cisco IOS Firewall technology.
© 2006 Cisco Systems, Inc. All rights reserved.SNRS v Adaptive Threat Defense Examining Cisco IOS Firewall.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Groups and Policies Configuring Policies.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Module Summary Event Management is an important component of network administration that deals.
© 2004, Cisco Systems, Inc. All rights reserved. CSIDS Lesson 10 Sensor Tuning.
© 2006 Cisco Systems, Inc. All rights reserved. SND v2.01 Securing Cisco Network Devices (SND) v2.0.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Module Summary CEF must be running as a prerequisite to running MPLS on a Cisco router. Frame-mode.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Securing Networks with Cisco IOS IPS Introducing IDS and IPS.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Module Summary An IPsec VPN is a collection of protocols that help you to hook up your company.
© 2006 Cisco Systems, Inc. All rights reserved.SND v Module Summary Routers play an important role in ensuring that network perimeters are secure;
© 2005 Cisco Systems, Inc. All rights reserved.SND v Module Summary Applying an effective security policy is the most important step that an organization.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v Module Summary Serial point-to-point connections are used to connect your LAN and a service.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v Cisco IOS Threat Defense Features Introducing Cisco IOS IPS.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Building IPsec VPNs Module Self-Check.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Introduction to Network Security Policies Module Self-Check.
Транксрипт:

© 2006 Cisco Systems, Inc. All rights reserved. SND v Securing Networks with Cisco IOS IPS Module Self-Check

© 2006 Cisco Systems, Inc. All rights reserved. SND v Introducing IDS and IPS DescriptionType Simple and reliable Customized policies Can detect unknown attacks Fewer false positives Needs fine tuning Window to view attacks Distract and confuse attackers Slow down and avert attacks Traffic profile must be constant Can detect unknown attacks Policy-based Signature-based Honey Pot-based Anomaly-based

© 2006 Cisco Systems, Inc. All rights reserved. SND v Introducing IDS and IPS (Cont.) Signature Alarm TypeDescription False positive An alarm is triggered by normal traffic or a benign action. False negative A signature is not fired when offending traffic is detected. True positive A signature is correctly fired when offending traffic is detected and an alarm is generated. True negative A signature is not fired when nonoffending traffic is captured and analyzed.

© 2006 Cisco Systems, Inc. All rights reserved. SND v Defending Your Network with Cisco IOS IPS Cisco IOS IPS Signature Feature Description Regular expression string pattern matching Enables the creation of string patterns using regular expressions Response actions Enables the sensor to take an action when the signature is triggered Alarm summarization Enables the sensor to aggregate alarms, to limit the number of times an alarm is sent when the signature is triggered Threshold configuration Enables a signature to be tuned to perform optimally in a network Antievasive techniques Enables a signature to defeat evasive techniques used by an attacker

© 2006 Cisco Systems, Inc. All rights reserved. SND v2.05-5