Cisco IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor Installation And Configuration Manual page 28

Intrusion detection system appliance and module
Table of Contents

Advertisement

Appliances
Your Network Topology
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
1-4
ACLs may block only future traffic, not current traffic.
Note
Generate IP session logs
IP session logs are used to gather information about unauthorized use. IP log
files are written when a certain event or events occur that you have configured
the appliance to look for.
Because the appliance is not in the data path, it has a negligible impact on network
performance. However, there are limitations on the data speeds it can monitor.
Before you deploy and configure your appliances, you should understand the
following about your network:
The size and complexity of your network.
Connections between your network and other networks (and the Internet).
The amount and type of network traffic on your network.
This knowledge will help you determine how many appliances are required, the
hardware configuration for each appliance (for example, the size and type of
network interface cards), and how many IDS managers are needed.
The appliance monitors all traffic across a given network segment. With that in
mind, you should consider all the connections to the network you want to protect.
These connections fall into four categories, or locations, as illustrated in
Figure 1-1 on page
1-5.
Chapter 1
Introducing the Sensor
78-15597-02

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Table of Contents