08-Introduction To IPS
08-Introduction To IPS
o Cisco IDS and IPS are used as part of a defense-in-depth approach to protect network.
o We install and configure IPS/IDS to monitor malicious traffic or activities on our network.
o Basically, Cisco IDS and IPS are used to protect the network against the malicious traffic.
o IDSs focus on detection whereas IPSs focus on threat or unauthorized access prevention.
o Biggest difference between Cisco IDS and Cisco IPS is that an IPS responds immediately.
o IPS does not allow malicious traffic to pass, whereas IDS, allow malicious traffic to pass.
Inline Mode:
o Normally, installed in-line & is used to actively monitor, analyze, and block malicious traffic.
o Analyzes live traffic that is forced to come in one port and out a second port of the IPS.
o So, all ingress and egress traffic must flow through the Cisco IPS Sensor for processing.
o Sensor is in the data path and the Sensor analyzes actual network traffic and analyzes.
o Sensor can drop malicious traffic before it reaches to intended target system or service.
Promiscuous Mode:
o IPS mode which sensor analyzes copy of monitored traffic rather than actual data packet.
o In Promiscuous Mode of Intrusion Prevention System (IPS) the sensor is not in data path.
o The IPS Sensor analyzes copy of network traffic not original, original traffic bypasses sensor.
o Promiscuous Mode of Intrusion Prevention System, sensor has limited preventive capability.
TAP Mode:
o Cisco IPS a TAP is a hardware device that allows you to capture packets flowing.
o TAPs transmit both send & receive data streams on separate dedicated channels.
o The TAP ensuring all data arrives at the monitoring or security device in real time.
o Network tap is inserted directly between two devices and allows the IPS to tap into.