From the course: Cisco Network Security: Intrusion Detection and Prevention

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Implementing an IPS

Implementing an IPS - Cisco Routers Tutorial

From the course: Cisco Network Security: Intrusion Detection and Prevention

Start my 1-month free trial

Implementing an IPS

- [Instructor] Cisco IOS IPS monitors the network and prevents intrusions by comparing traffic against a signature database of known threats. If a threat is detected and triggers a signature the device can block the malicious traffic. There are several steps necessary to implement IOS IPS. The first thing you'll need to do is download the IOS IPS files. Older Cisco IOS releases had built-in signatures, however, newer versions do not have the built-in signatures. Therefore, you'll need to log in to cisco.com with your username and password. And then download the IOS IPS signature package files, along with the public crypto key from cisco.com. You'll then need to create a configuration directory in Flash to store the signature files and configurations. You'll then configure an IOS IPS crypto key used by IOS IPS. The public key is the text file that you downloaded from Cisco. The master signature file is signed by a Cisco private key to guarantee that it's authentic and the integrity has…

Contents