tstanik Tue, 12/16/2008 - 07:24
User Badges:
  • Bronze, 100 points or more

IDSM-2 captures network packets and then reassembles and compares the packet data against attack signatures indicating typical intrusion activity. Network traffic is either copied to IDSM-2 based on security VACLs in the switch or is copied to IDSM-2 through the switch's SPAN port feature.


This Discussion