© SANS Institute 200
8
,
Author retains full rights.
© SANS Institute 200
8
, Author retains full rights.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
Network IDS & IPS Deployment Strategies
IPS fails the network will typically see an increase in activity. Something for network
engineers and intrusion analysts alike to consider when a significant unexplained
spike in network activity is noticed on internal networks.
Connecting an IPS is rather simple. After reading this section, you may wonder
what can be done to monitor traffic when an IPS either fails entirely, or allows
malicious traffic through; perhaps from not being strict enough. A layered approach
is introduced in the next section.