Cisco IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor Arkusz Danych Strona 65

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 168
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 64
642 -531
Leading the way in IT testing and certification tools, www.testking.com
- 65 -
The sensor compares the list of signatures with network activity. When a match is found, the
sensor takes an action, such as logging the event or sending an alarm to IDS Event Viewer.
Sensors allow you to modify existing signatures and define new ones.
Signature-based intrusion detection can produce false positives because certain normal
network activity can be misinterpreted as malicious activity. For example, some network
applications or operating systems may send out numerous ICMP messages, which a signature-
based detection system might interpret as an attempt by an attacker to map out a network
segment. You can minimize false positives by tuning your sensors.
To configure a sensor to monitor network traffic for a particular signature, you must enable
the signature. By default, the most critical signatures are enabled when you install IDS Device
Manager. When an attack is detected that matches an enabled signature, the sensor generates
an alert event (formerly known as an alarm), which is stored in the sensor’s event store. The
alert events, as well as other events, may be retrieved from the event store by web-based
clients. By default the sensor logs all Informational alarms or higher. If you have added IDS
Event Viewer as a destination, the alarm is sent to the IDS Event Viewer database and you
can view the alarm in IDS Event Viewer.
Configuring IP Logging
You can configure a sensor to generate an IP session log when the sensor detects an attack.
When IP logging is configured as a response action for a signature and the signature is
triggered, all packets to and from the source address of the alarm are logged for a specified
period of time. You can set the number of minutes events are logged.
Reference:
Installing and Using the Cisco Intrusion Detection System Device Manager and Event
Viewer Version 4.1
Cisco Courseware 12-18
Przeglądanie stron 64
1 2 ... 60 61 62 63 64 65 66 67 68 69 70 ... 167 168

Komentarze do niniejszej Instrukcji

Brak uwag