© 2001, Cisco Systems, Inc. CSIDS 2.0—1-1 Cisco Secure Intrusion Detection System 2.0.

Slides:



Advertisements
Présentations similaires
Mardi, le 21 Janvier 2014 Agenda du jour Les Verbes Réfléchis
Advertisements

Un rendez-vous en ville.
Objectifs Today we will work on:  Days of the week  Months of the year  Exchanging simple spoken and written information in French Activité  Completez.
PLAN Correction du RUSH 3
Write complete sentences. Use imparfait and the passé composé in each sentence. Link the sentences with QUAND. Bonne Chance! 1. Nous/ faire la vaisselle/Pierre/téléphoner.
Le Français I- Lesson Plan: Leçon 9 ACTFL Standards: COMMUNICATION - Communicate in Languages Other Than English Standard 1.1: Students engage in conversations,
ABCDABCD EFGHEFGH I 1. avec balcon2. avec vue sur la mer 3. avec télé4. avec douche 5. avec un grand lit 6. pour deux nuits 7. avec téléphone 8. à deux.
French leve 1 - Homework due on May 2, 2016 – vocabulary  You are given at the beginning of the year the global list of the vocabulary list of BON VOYAGE,
La famille Unité 5. The following vocabulary words will be those family members as they relate to YOU. You will see the word “MOI” (me) on the first slide.
Presentation Title Your company name.
1 Case Study 1: UNIX and LINUX Chapter History of unix 10.2 Overview of unix 10.3 Processes in unix 10.4 Memory management in unix 10.5 Input/output.
Name of presentation Company name.
IP Multicast Text available on
DIFFERENTIATION NO ONE CAN COMPEL A STUDENT TO LEARN. (MEIRIEU)
Overview of SUN’s Unix Campus-Booster ID : **XXXXX Copyright © SUPINFO. All rights reserved Introduction to Solaris 10.
Architecture de Réseaux Travaux Pratiques
Les devoirs - homework Instructions:
Français I Leçon 1B - vocabulaire
Les devoirs - homework Instructions:
Les devoirs - homework Instructions:
IGTMD réunion du 4 Mai 2007 CC IN2P3 Lyon
Les devoirs - homework Instructions:
TP - Spanning-Tree - Per-VLAN Spanning-tree
Téléchargement IOS - Commande tftpdnld du ROM Monitor
AUJOURD’HUI: C’est le 28 octobre Le jour: mercredi
The nation now known as The Democratic Republic of Congo was at one time the personal property of the King of Belgium.
Architecture de Réseaux Travaux Pratiques
le lundi 25 avril Bonjour, classe
1MPES2 Order of Operations
Pile IGMPv3 de Host.
Architecture de Réseaux Travaux Pratiques
Why is it important to plan ahead for the future?
1MPES2 Remarkable Identities
7GBo Photocard Assessment
Year 7 French Homework Mme Janickyj Autumn term 2
Year 7 French Homework Mme Janickyj Autumn term 2
mardi 11 septembre 2018mardi 11 septembre 2018
Objectifs: To revise telling the time in French
Les instructions dans la classe de français. Objectives By the end of this lesson you will able to understand words and instructions commonly used in.
Quiz What are the different Copper cable types ? How is STP better than UTP ? What type of cable should we use between : Router-Switch, PC-Router, Hub-Switch.
Setting SMART Objectives Training. ©SHRM Introduction Of all the functions involved in management, planning is the most important. As the old saying.
Short Presentation English class HACKERS. TYPE OF HACKERS 'Black Hat' Hackers : criminals and wrongdoers. 'White Hat' Hackers : ethical hackers who.
Room Cool Row Cool Air Distribution Unit Room Cool Row Cool Air Distribution Unit Precision cooling Precision cooling MV PDU LV PDU PQC Transformer Generator.
LEARNING OBJECTIVE: RECOGNISE NUMBERS UP TO 100 IN FRENCH
Respond to bullet points – 90 words [16 marks]
LESSON OBJECTIVES By the end of this lesson, I will be able to:
Pour commencer…Corrige les erreurs
Bonjour !! Hello!! Welcome!! Bienvenue!!! Year 7 Module 1
General information SU-INFRA
L’École Objective: By the end of the lesson you will be able to describe your school.
Presentation Title Your company name.
Vous vous intéressez aux animaux?
Understanding Constraints in Primavera P6Primavera P6.
Vulnerability Analysis by : Wail Belhouchet Dr Djouad Tarek 1.
Questions Synthesis.
SÉCURITÉ RÉSEAU 420-SR1-T420-ESR-TT Cisco CCNA Security Session hiver 2017 A.Bouzidi.
Ftpworldwide-Company FTP Worldwide has a simple, secure and flexible solution for your managed file transfer and file sharing needs. Unlike many of our.
HUAWEI TECHNOLOGIES CO., LTD. VLAN Principles. Copyright © 2016 Huawei Technologies Co., Ltd. All rights reserved. Page 2 Foreword A Virtual Local Area.
Dans ma Salle de classe
Jour 6 MOT DE PASSE:ne faire que + infinitif- to do nothing but
Protocoles d'administration réseau CDP, LLDP
Les vacances.
Jour 12 MOT DE PASSE:faire venir - to ask to come, to bring along
Jour 13 MOT DE PASSE:Prendre son parti de quelque chose – to make up one’s mind about something J’ai pris mon parti des devoirs Nous avons fait notre parti.
Vouloir, Pouvoir, Être.
Jour 7 MOT DE PASSE:Jouir de - to enjoy
Répondez aux 5 questions – Travaillez à deux
Cold Fusion High Availability “Taking It To The Next Level” Presenter: Jason Baker, Digital North Date:
Starter– Les disputes familiales
Transcription de la présentation:

© 2001, Cisco Systems, Inc. CSIDS 2.0—1-1 Cisco Secure Intrusion Detection System 2.0

© 2001, Cisco Systems, Inc. CSIDS 2.0—1-2 Chapter 1 Course Introduction

© 2001, Cisco Systems, Inc. CSIDS 2.0—1-3 Course Objectives Upon completion of this course, you will be able to perform the following tasks: Install and configure CSPM and the CSIDS Sensor in multiple network configurations. Use CSPM to centrally manage and configure multiple Sensors. Configure the CSIDS Sensor to detect, respond to, and report intrusion activity. Use CSPM to translate intrusion data into intuitive and effective graphical displays.

© 2001, Cisco Systems, Inc. CSIDS 2.0—1-4 Course Objectives (cont.) Use the CSIDS NSDB to view signature and network security vulnerability information. Develop and implement customized intrusion detection signatures. Configure the CSIDS Sensor in device management mode to interface with a Cisco IOS router to stop network attacks. Configure the Catalyst 6000 IDS Module for the Catalyst 6000 family of switches to perform intrusion detection in multiple VLANs. Understand the CSIDS architecture and the relationship between configuration files and tokens.

© 2001, Cisco Systems, Inc. CSIDS 2.0—1-5 Course Agenda Chapter 1—Course Introduction Chapter 2—Introduction to Network Security Chapter 3—Intrusion Detection and the Cisco Secure IDS Environment Chapter 4—Cisco Secure Policy Manager Installation Chapter 5—Cisco Secure IDS Sensor Installation Chapter 6—Alarm Management Chapter 7—Cisco Secure IDS Signatures

© 2001, Cisco Systems, Inc. CSIDS 2.0—1-6 Course Agenda (cont.) Chapter 8 — Sensor Configuration Chapter 9 — Signature and Intrusion Detection Configuration Chapter 10 — IP Blocking Configuration Chapter 11 — Catalyst 6000 IDS Module Configuration Chapter 12 — Cisco Secure IDS Architecture

© 2001, Cisco Systems, Inc. CSIDS 2.0—1-7 Student Responsibilities Complete prerequisites Participate in lab exercises Ask questions Provide feedback Participant Responsibilities

© 2001, Cisco Systems, Inc. CSIDS 2.0—1-8 General Administration Class-related Sign-in sheet Length and times Break and lunch room locations Attire Facilities-related Participant materials Site emergency procedures Restrooms Telephones/faxes

© 2001, Cisco Systems, Inc. CSIDS 2.0—1-9 Ethernet link Router PIX Firewall CSIDS Sensor Internet Server Student Workstation/Server CSIDS Director CSPM Graphic Symbols

© 2001, Cisco Systems, Inc. CSIDS 2.0—1-10 Your name Your company Pre-req skills Brief history Objective Participant Introductions

© 2001, Cisco Systems, Inc. CSIDS 2.0—1-11 Lab Topology

© 2001, Cisco Systems, Inc. CSIDS 2.0—1-12 Pod P Your Pod Pod Q Peer Pod CSPM Lab Visual Objective rP e0/0 e0/ P.0 /24.P.1.4 rQ e0/0 e0/1.Q Q.0 / / P.3CSPM10.0.Q.3 Host ID = 3, Org ID = P Host Name = cspm P, Org Name = pod P Host ID = 3, Org ID = Q Host Name = cspm Q, Org Name = pod Q.6 sensorP idsmP sensorQ idsmQ