Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Cisco IDS 4215

Posted on 2005-05-10
1
Medium Priority
?
133 Views
Last Modified: 2010-04-08
Hi All

I have configured my router 2600 to be the bloc device for my IDS, and I have set the actions for some of the signatures, but I noticed that the ACL is being creating in the Router, but does not blok the attack as it creates the ACL for example
Deny Ip Host xx.xx.xx.xx any. this mean that the attacker can not access thge router only.


Thanks
0
Comment
Question by:ibmas4002
1 Comment
 
LVL 12

Accepted Solution

by:
srikrishnak earned 1500 total points
ID: 13977202
You mean to say that the attacker will be able to connect to the networks behind the router or any hosts in the same subnet...??then you may need to correct the command...
0

Featured Post

Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Despite its rising prevalence in the business world, "the cloud" is still misunderstood. Some companies still believe common misconceptions about lack of security in cloud solutions and many misuses of cloud storage options still occur every day. …
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

571 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question