When Sensors Detect Malicious Traffic

Based on how the sensor is configured and which mode it is in (IPS or IDS), the sensor can implement the actions described in Table 17-4.

Image
Image

Table 17-4 Possible Sensor Responses to Detected Attacks


Note

All of the “deny” response options in Table 17-4 apply only to a sensor that is in IPS mode.


..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset