From the course: Cisco Network Security: Intrusion Detection and Prevention
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Implementing an IPS - Cisco Routers Tutorial
From the course: Cisco Network Security: Intrusion Detection and Prevention
Implementing an IPS
- [Instructor] Cisco IOS IPS monitors the network and prevents intrusions by comparing traffic against a signature database of known threats. If a threat is detected and triggers a signature the device can block the malicious traffic. There are several steps necessary to implement IOS IPS. The first thing you'll need to do is download the IOS IPS files. Older Cisco IOS releases had built-in signatures, however, newer versions do not have the built-in signatures. Therefore, you'll need to log in to cisco.com with your username and password. And then download the IOS IPS signature package files, along with the public crypto key from cisco.com. You'll then need to create a configuration directory in Flash to store the signature files and configurations. You'll then configure an IOS IPS crypto key used by IOS IPS. The public key is the text file that you downloaded from Cisco. The master signature file is signed by a Cisco private key to guarantee that it's authentic and the integrity has…