When Sensors Detect Malicious Traffic
Based on how the sensor is configured and which mode it is in (IPS or IDS), the sensor can implement the actions described in Table 17-4.
Table 17-4 Possible Sensor Responses to Detected Attacks
Note
All of the “deny” response options in Table 17-4 apply only to a sensor that is in IPS mode.
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.