not be blocked by IPS because legitimate connectivity would be interrupted, but the alerts you receive about this traffic can provide valuable insight into potential problems or attack techniques when configured properly. Cisco IOS IPS
Cisco has implemented IPS functions into its internetwork operating system, Cisco IOS software. Figure summarizes the Cisco IOS IPS features. Cisco IOS ISP combines existing Cisco IDS and IPS product features with three different intrusion detection techniques.
Content 6.4 Introducing Cisco IOS IPS 6.4.2 Types of IDS and IPS Systems Figure describes IDS and IPS solutions, grouping the types of IDS and IPS solutions into solutions based on their deployment within a network and how they identify offending traffic. There are two possible deployment options for IDS and IPS solutions: IDS and IPS uses any one of four approaches to identifying malicious traffic:
Content 6.4 Introducing Cisco IOS IPS 6.4.3 Network-Based and Host-Based IPS Figure illustrates the concept of network- and host-based approaches to IDS and IPS. Comparing HIPS and NIPS
IPS systems can differ in their operational scope. Monitoring intrusive activity can occur at two locations: Note
The classification into network-based and host-based systems applies to IDS in the same way that the classification applies to IPS. For simplicity, the lesson refers to IPS only, because Cisco IPS encompasses a wider functionality than IDS encompasses. Comparing HIPS and NIPS
Figure shows how NIPS and HIPS complement each other. The two-ended arrow represents the relative weight that each of these systems places on specific functions. As a general statement, NIPS focuses on detecting buffer overflows, attacks on web servers, network reconnaissance, and denial of service (DoS) attacks, while HIPS focuses on application and host resource protection. A significant advantage of HIPS is that HIPS can monitor operating system processes and protect critical system resources, including files that may exist only on a specific host. HIPS combines behavioral analysis and signature filters. HIPS can also combine the best features of antivirus, network firewalls, and application firewalls in one package. A simple form of HIPS enables system logging and log analysis on the host. However, this approach can be extremely labor-intensive. HIPS requires software such as the CSA to be installed on each host to monitor activity that is performed on and against the host. The CSA performs the intrusion prevention analysis and protects the host.
Content 6.4 Introducing Cisco IOS IPS 6.4.4 NIPS Features Figure describes the features of a NIPS. NIPS involves deploying monitoring devices, or sensors, throughout a network to capture and analyze traffic. Sensors detect malicious and unauthorized activity in real time and can take action when required. Sensors are deployed at designated network points, enabling security managers to monitor network activity while the activity occurs, regardless of the location of the target of the attack. NIPS sensors are tuned for