capture on the IDSM?

Refer to the exhibit. Given this network design, which command would you use to configure traffic
capture on the IDSM?

Exhibit:

Refer to the exhibit. Given this network design, which command would you use to configure traffic
capture on the IDSM?

Exhibit:

A.
monitor session 1 source vlan 10

B.
monitor session 1 sourcevlan 20

C.
intrusion-detection module 5 data-port 1 access-vlan 10

D.
intrusion-detection module 5 data-port 1 access-vlan 20



Leave a Reply 0

Your email address will not be published. Required fields are marked *