Chapter 1 Introducing the Sensor
Appliances
1-4
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
Note
ACLs may block only future traffic, not current traffic.
•
Generate IP session logs
IP session logs are used to gather information about unauthorized use. IP log
files are written when a certain event or events occur that you have configured
the appliance to look for.
Because the appliance is not in the data path, it has a negligible impact on network
performance. However, there are limitations on the data speeds it can monitor.
Your Network Topology
Before you deploy and configure your appliances, you should understand the
following about your network:
•
The size and complexity of your network.
•
Connections between your network and other networks (and the Internet).
•
The amount and type of network traffic on your network.
This knowledge will help you determine how many appliances are required, the
hardware configuration for each appliance (for example, the size and type of
network interface cards), and how many IDS managers are needed.
The appliance monitors all traffic across a given network segment. With that in
mind, you should consider all the connections to the network you want to protect.
These connections fall into four categories, or locations, as illustrated in
Figure 1-1 on page 1-5
.
Summary of Contents for IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor
Page 4: ......
Page 450: ...Appendix B Troubleshooting ...