From the course: Implementing Cisco Software-Defined Wan (SD-WAN) for your Enterprise and Cloud

Unlock this course with a free trial

Join today to access over 24,400 courses taught by industry experts.

Additional on device security services

Additional on device security services

- [Instructor] Now let's continue our discussion about the on-device security stack. We'll continue with the Intrusion Prevention System, or Intrusion Detection System depending upon how you want to configure it. Now this will use the virtual image that's based upon the Snort engine. And so if you think about it, traffic that flows through one end of the cable, we'll process through the Snort engine, and then back out through the other end of the cable. So we're going to monitor network traffic against a defined rule set, and we're also then going to perform attack classifications against the traffic to see if it's actually truly malicious or not. And then we'll initiate actions based upon the rules on the suspicious traffic. Now the way that we get traffic to and fro of the Snort engine, is through the use of virtual port groups as here. And then we also have another virtual port, which is going to be used for the management of the Snort engine itself. Now the IPS solution is going…

Contents