The IPS guidance covers Internet edge inline deployments as well as deployments of an intrusion detection system (IDS) on an internal distribution layer, also called promiscuous deployments.
The Internet edge is the point where the organization’s network connects to the Internet. This is the perimeter of the network, where a line is drawn between the public Internet and the private resources contained with an organization’s network.
Worm, virus, and botnet infiltrations pose substantial threats to network performance, availability, and data security. To add to these problems, an organization’s Internet connection can contribute to employee productivity loss and leakage of confidential data. Internet-based attackers are a threat to an organization’s network infrastructures and data resources.
Most networks connected to the Internet are subject to a constant barrage of worms, viruses, and targeted attacks.
Organizations must vigilantly protect their network, user data, and customer information. Additionally, most network addresses must be translated to an Internet-routable address, and the firewall is the logical place for this function.
File Type: PDF
File Size: 4.22 MB
Total Pages: 110
Direct Link Mega:
Direct Link AnonFiles:
Direct Link Mediafire:
Direct Link Solidfiles:
Direct Link Sabercathost:
Direct Link Tusfiles: