Network-based Intrusion Prevention products use sensors to analyze network traffic at numerous locations throughout your network. These sensors are deployed in various form factors, such as the following:
Standalone appliance sensors
Intrusion Prevention System (IPS) software integrated into the operating system (OS) on infrastructure devices
Regardless of the form factor of your sensors, your sensors must receive the network traffic that needs to be analyzed. Capturing network traffic varies depending on whether you are using inline mode or promiscuous mode. After your sensors have captured network traffic, their analysis of the traffic falls into the following categories based on the way that the signatures ...