List of Tables

List of Tables

Chapter 24: Cisco Secure Intrusion Detection System

Table 24-1: Comparison of 4200 Series Network Sensors
Table 24-2: CSPM and Director for UNIX Comparison
Table 24-3: Configuration Commands with Syntax
Table 24-4: Syntax Parameter Description

Chapter 25: Sensor Installation and Configuration

Table 25-1: Terminal Settings
Table 25-2: Solaris and CIDS User Accounts and Commands
Table 25-3: Bootstrap Information
Table 25-4: Sensor Monitoring Interfaces

Chapter 26: Signature and Alarm Management

Table 26-1: Content- and Context-Based Signatures
Table 26-2: Alarm Levels and Severities
Table 26-3: Event Viewer Alarm Fields



Part III: Virtual Private Networks (VPNs)