Introducing Cisco IOS IPS参考.ppt

  1. 1、本文档共26页,可阅读全部内容。
  2. 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Introducing Cisco IOS IPS参考

Cisco IOS Threat Defense Features Introducing Cisco IOS IPS IDS Introduction IDS is a passive device—traffic does not pass through the IDS device. IDS是一个被动的设备-流量不会通过IDS. IDS is reactive—generates alert to notify manager of malicious traffic. IDS针对恶意的流量会产生警告信息通知管理者. Optional active response: Further malicious traffic may be denied with security appliance or router 恶意的流量可以被安全设备或路由拒绝 TCP resets can be sent to the source device 重置TCP能够发送给源设备 IPS Introduction IPS is an active device: IPS是一个主动设备 All traffic passes through IPS 所有流量会通过IPS Uses multiple interfaces 使用多个接口 Proactive prevention: Malicious traffic is denied 对恶意流量的拒绝 Alert is sent to management station 向指定的管理站点发送警告 Combining IDS and IPS IPS actively blocks offending traffic: IPS能够积极的阻止令人不快的流量: Should not block legitimate data 不会阻止合法的数据 Only stops “known malicious traffic” 仅仅阻塞“已知的恶意流量” Requires focused tuning to avoid connectivity disruption 需要针对其进行性能调优才能有效的避免连接被中断 IDS complements IPS: IDS组合IPS: Verifies that IPS is still operational 仍然需要IPS进行确认 Alerts about any suspicious data except “known good traffic” 除了已知的安全的流量以外的其它可疑数据均会产生警告 Covers the “gray area” of possibly malicious traffic that IPS did not stop 保护IPS不能阻止的可能有风险 “灰色区域”的流量 Types of IDS and IPS Systems Signature-Based IDS and IPS Policy-Based IDS and IPS Observes, and blocks or alarms if an event outside the configured policy is detected 使用已经配置的策略来进行检测阻塞或警告 Requires a policy database 需要策略数据库 Anomaly-Based IDS and IPS Honeypot Network-Based and Host-Based IPS NIPS: Sensor appliances are connected to network segments to monitor many hosts. HIPS: Centrally managed software agents are installed on each host. Cisco Security Agents (CSAs) defend the protected hosts and report to the central management console. HIPS provides individual host detection and protection. HIPS does not require special hardware. Network-Based vs. Host-Based IPS NIDS and NIPS Deployment Signature Categories Four types of signatures: 四种类型的签名: Exploit signatures match specific known atta

文档评论(0)

2017meng + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档