Summary

The preceding configuration combines most of the issues discussed in this chapter. Chapter 6 will discuss how the Intrusion Detection System works as a standalone option, as well as in conjunction with CBAC. Review the preceding configuration example before moving on to Chapter 6.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
13.59.140.238