© 2006 Cisco Systems, Inc. All rights reserved. SND v2.05-1 Module Summary IDS technology is passive; it monitors the network for suspicious activity and.

Презентация:



Advertisements
Похожие презентации
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary The Cisco IOS Firewall feature set combines existing Cisco IOS Firewall technology.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. SND v Securing Networks with Cisco IOS IPS Configuring Cisco IOS IPS.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v Module Summary Serial point-to-point connections are used to connect your LAN and a service.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v Module Summary Cisco IOS Firewall combines the stateful firewall engine with application-layer.
© 2005 Cisco Systems, Inc. All rights reserved. Course acronym vx.x#-1 © 2005 Cisco Systems, Inc. All rights reserved. SND v Module Summary Cisco.
© 2005 Cisco Systems, Inc. All rights reserved. MPLS v Module Summary VPNs replace dedicated links with virtual point-to-point links on common infrastructure,
© 2006 Cisco Systems, Inc. All rights reserved.SNRS v Adaptive Threat Defense Examining Cisco IOS Firewall.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Module Summary CEF must be running as a prerequisite to running MPLS on a Cisco router. Frame-mode.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Module Summary MPLS is a forwarding mechanism in which packets are forwarded based on labels.
© 2006 Cisco Systems, Inc. All rights reserved.SND v Module Summary Routers play an important role in ensuring that network perimeters are secure;
© 2004, Cisco Systems, Inc. All rights reserved. CSIDS Course Agenda Day 1 Lesson 1Course Introduction Lesson 2Network Security and Cisco Lesson.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary IPsec is designed to provide interoperable, high-quality, cryptographically.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Module Summary An IPsec VPN is a collection of protocols that help you to hook up your company.
© 2006 Cisco Systems, Inc. All rights reserved. SND v2.01 Securing Cisco Network Devices (SND) v2.0.
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Security Design Review Define the security requirements. Define the security policy. Integrate.
© 2006 Cisco Systems, Inc. All rights reserved. GWGK v Module Summary A gatekeeper is an H.323 entity on the network, which provides services such.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary Cisco NFP includes protection of the control, management, and data planes. CPPr.
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Evaluating Security Solutions for the Network Selecting Network Security Solutions.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Using CSA Analysis.
© 2006 Cisco Systems, Inc. All rights reserved. GWGK v Module Summary IP-to-IP gateways can be used to interconnect VoIP networks by allowing VoIP.
Транксрипт:

© 2006 Cisco Systems, Inc. All rights reserved. SND v Module Summary IDS technology is passive; it monitors the network for suspicious activity and parsed system log files. IPS technology is reactive; it is able to forward or drop packets based on what is detected. Use the Cisco SDM to configure Cisco IOS IPS on Cisco network routers. Cisco IPS sensor platforms are used together to provide intrusion protection. Cisco IOS IPS is used in combination with the Cisco IDS, Cisco IOS Firewall, VPN, and NAC Cisco product. It provides superior threat protection at all entry points into the network.