<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IDS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ids/m-p/325777#M98238</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi sushil&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IDS can be configured to drop packets. IDS basically can do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;log, reset tcp, shun connection &amp;amp; shun host..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; IDS has a list of predefined attacks called signatures. You can manually configure a signature and set it to block a host or connection or reset the tcp session. by default logging is enabled on signatures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for eg, you have a sync attack from one of the host, which the IDS detects from its signature database. You , as an administrator, can manually go to the signature and configure it as "shun host" or "shun connection" to block the packets. blocking can be done on a firewall or a router, which will act parallel to the IDS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this helps.. for more information you can visit &lt;A class="jive-link-custom" href="http://www.cisco.com/go/ids" target="_blank"&gt;www.cisco.com/go/ids&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 24 Jan 2005 10:27:28 GMT</pubDate>
    <dc:creator>sachinraja</dc:creator>
    <dc:date>2005-01-24T10:27:28Z</dc:date>
    <item>
      <title>IDS</title>
      <link>https://community.cisco.com/t5/network-security/ids/m-p/325776#M98237</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does IDS drops packets????&lt;/P&gt;&lt;P&gt;If yes then in what conditions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:14:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ids/m-p/325776#M98237</guid>
      <dc:creator>sushilk</dc:creator>
      <dc:date>2019-03-10T09:14:38Z</dc:date>
    </item>
    <item>
      <title>Re: IDS</title>
      <link>https://community.cisco.com/t5/network-security/ids/m-p/325777#M98238</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi sushil&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IDS can be configured to drop packets. IDS basically can do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;log, reset tcp, shun connection &amp;amp; shun host..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; IDS has a list of predefined attacks called signatures. You can manually configure a signature and set it to block a host or connection or reset the tcp session. by default logging is enabled on signatures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for eg, you have a sync attack from one of the host, which the IDS detects from its signature database. You , as an administrator, can manually go to the signature and configure it as "shun host" or "shun connection" to block the packets. blocking can be done on a firewall or a router, which will act parallel to the IDS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this helps.. for more information you can visit &lt;A class="jive-link-custom" href="http://www.cisco.com/go/ids" target="_blank"&gt;www.cisco.com/go/ids&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jan 2005 10:27:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ids/m-p/325777#M98238</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2005-01-24T10:27:28Z</dc:date>
    </item>
  </channel>
</rss>

