SlideShare a Scribd company logo
1 of 1
Download to read offline
Router Switeh Routen pe Ping pe Wireless. 7W aicess point DMZ Zone auess point out ey acess
poinf Broadbond wrreless access autess point Servers
Solution
The logic behind IDS sensors is that they actually try to sniff the route in which your network
traffic flows.
whereas the IPS(intrusion protection system) is more effective.The IDS has the ability to only
detect the uneven activity but can't do with the help of IPS feature.
if a user want to check or sniff all the traffic when the user is connected to the outside
world(internet) just set the IDS outside the firewal.
if a user want to check the traffic which is flowing inside the network whether malicious or not
the best idea would be to install IDS inside the firewall.
the DMZ zone is also said as(demilitarized zone) is a sub-network where the internal network(
internal LAN) is seperated from the other untrusted network like the internet. the external
servers,or the resources and services are located in the DMZ so they are easily accessible from
the Internet but the other part of the internal LAN remains safe as it is not reacheble.it restricts
the ability of hackers to directly access the internal servers present in a network as well as the
data also with the help of accessing Internet.
the best way to put IPS/IDS is near the firewal(outside the firewal) so can manage every traffic
comming from outside like internet and if the traffic seems suspicious can simply block the
packet or traffic outside the network only.
IDS is expensive so it can't be use at many areas but the best to use is near firewall only.

More Related Content

Similar to Router Switeh Routen pe Ping pe Wireless. 7W aicess point DMZ Zone au.pdf

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Akhil Kumar
 
Comparison of network intrusion detection
Comparison of network intrusion detectionComparison of network intrusion detection
Comparison of network intrusion detection
mtamilpriya
 

Similar to Router Switeh Routen pe Ping pe Wireless. 7W aicess point DMZ Zone au.pdf (20)

ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012
 
Intrusion Detection in WLANs
Intrusion Detection in WLANsIntrusion Detection in WLANs
Intrusion Detection in WLANs
 
Cours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptxCours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptx
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Comparison of network intrusion detection
Comparison of network intrusion detectionComparison of network intrusion detection
Comparison of network intrusion detection
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
 
CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter Security
 
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
 
IDS n IPS
IDS n IPSIDS n IPS
IDS n IPS
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
 
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and DemeritsSignature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring SystemIntrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring System
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 
The Need For IoT Gateway.docx
The Need For IoT Gateway.docxThe Need For IoT Gateway.docx
The Need For IoT Gateway.docx
 

More from amrishinda

JAVA A double-ended queue is a list that allows the addition and.pdf
JAVA A double-ended queue is a list that allows the addition and.pdfJAVA A double-ended queue is a list that allows the addition and.pdf
JAVA A double-ended queue is a list that allows the addition and.pdf
amrishinda
 
Implement threads and a GUI interface using advanced Java Swing clas.pdf
Implement threads and a GUI interface using advanced Java Swing clas.pdfImplement threads and a GUI interface using advanced Java Swing clas.pdf
Implement threads and a GUI interface using advanced Java Swing clas.pdf
amrishinda
 
Determine the missing amounts. (Hint For example, to solve for (a), .pdf
Determine the missing amounts. (Hint For example, to solve for (a), .pdfDetermine the missing amounts. (Hint For example, to solve for (a), .pdf
Determine the missing amounts. (Hint For example, to solve for (a), .pdf
amrishinda
 
devise a hypothesis that explains the geographical distribution of m.pdf
devise a hypothesis that explains the geographical distribution of m.pdfdevise a hypothesis that explains the geographical distribution of m.pdf
devise a hypothesis that explains the geographical distribution of m.pdf
amrishinda
 
Connect a motor, two push buttons and two LEDS to the Arduino as sho.pdf
Connect a motor, two push buttons and two LEDS to the Arduino as sho.pdfConnect a motor, two push buttons and two LEDS to the Arduino as sho.pdf
Connect a motor, two push buttons and two LEDS to the Arduino as sho.pdf
amrishinda
 
Caterpillar is one of the Americas major exporters. The company sell.pdf
Caterpillar is one of the Americas major exporters. The company sell.pdfCaterpillar is one of the Americas major exporters. The company sell.pdf
Caterpillar is one of the Americas major exporters. The company sell.pdf
amrishinda
 
What are the three forms of Business Organizations Answer the follow.pdf
What are the three forms of Business Organizations Answer the follow.pdfWhat are the three forms of Business Organizations Answer the follow.pdf
What are the three forms of Business Organizations Answer the follow.pdf
amrishinda
 

More from amrishinda (20)

JAVA A double-ended queue is a list that allows the addition and.pdf
JAVA A double-ended queue is a list that allows the addition and.pdfJAVA A double-ended queue is a list that allows the addition and.pdf
JAVA A double-ended queue is a list that allows the addition and.pdf
 
Let f(z) be an entire function such that fn+1(z) equivalent 0, Prove.pdf
Let f(z) be an entire function such that fn+1(z) equivalent 0, Prove.pdfLet f(z) be an entire function such that fn+1(z) equivalent 0, Prove.pdf
Let f(z) be an entire function such that fn+1(z) equivalent 0, Prove.pdf
 
Implement threads and a GUI interface using advanced Java Swing clas.pdf
Implement threads and a GUI interface using advanced Java Swing clas.pdfImplement threads and a GUI interface using advanced Java Swing clas.pdf
Implement threads and a GUI interface using advanced Java Swing clas.pdf
 
If a cells contents are greatly hypo-osmotic to the surrounding env.pdf
If a cells contents are greatly hypo-osmotic to the surrounding env.pdfIf a cells contents are greatly hypo-osmotic to the surrounding env.pdf
If a cells contents are greatly hypo-osmotic to the surrounding env.pdf
 
How are the forelimbs of humans, the wings of birds, the wings of ba.pdf
How are the forelimbs of humans, the wings of birds, the wings of ba.pdfHow are the forelimbs of humans, the wings of birds, the wings of ba.pdf
How are the forelimbs of humans, the wings of birds, the wings of ba.pdf
 
Fom 1120, Sched Mark for follow up Question 15 of 105. A corporat.pdf
Fom 1120, Sched Mark for follow up Question 15 of 105. A corporat.pdfFom 1120, Sched Mark for follow up Question 15 of 105. A corporat.pdf
Fom 1120, Sched Mark for follow up Question 15 of 105. A corporat.pdf
 
Germ cells are set aside during animal development and give rise to .pdf
Germ cells are set aside during animal development and give rise to .pdfGerm cells are set aside during animal development and give rise to .pdf
Germ cells are set aside during animal development and give rise to .pdf
 
Determine the missing amounts. (Hint For example, to solve for (a), .pdf
Determine the missing amounts. (Hint For example, to solve for (a), .pdfDetermine the missing amounts. (Hint For example, to solve for (a), .pdf
Determine the missing amounts. (Hint For example, to solve for (a), .pdf
 
Discuss the various methods of intellectual property protection avai.pdf
Discuss the various methods of intellectual property protection avai.pdfDiscuss the various methods of intellectual property protection avai.pdf
Discuss the various methods of intellectual property protection avai.pdf
 
devise a hypothesis that explains the geographical distribution of m.pdf
devise a hypothesis that explains the geographical distribution of m.pdfdevise a hypothesis that explains the geographical distribution of m.pdf
devise a hypothesis that explains the geographical distribution of m.pdf
 
Describe a diode array detector and CCD camera. Differentiate betwee.pdf
Describe a diode array detector and CCD camera. Differentiate betwee.pdfDescribe a diode array detector and CCD camera. Differentiate betwee.pdf
Describe a diode array detector and CCD camera. Differentiate betwee.pdf
 
Connect a motor, two push buttons and two LEDS to the Arduino as sho.pdf
Connect a motor, two push buttons and two LEDS to the Arduino as sho.pdfConnect a motor, two push buttons and two LEDS to the Arduino as sho.pdf
Connect a motor, two push buttons and two LEDS to the Arduino as sho.pdf
 
Consider managers (supervisors) that you have worked for in the past.pdf
Consider managers (supervisors) that you have worked for in the past.pdfConsider managers (supervisors) that you have worked for in the past.pdf
Consider managers (supervisors) that you have worked for in the past.pdf
 
Caterpillar is one of the Americas major exporters. The company sell.pdf
Caterpillar is one of the Americas major exporters. The company sell.pdfCaterpillar is one of the Americas major exporters. The company sell.pdf
Caterpillar is one of the Americas major exporters. The company sell.pdf
 
what numbers go with these descriptions.1. Uses ATP hydrolysis2..pdf
what numbers go with these descriptions.1. Uses ATP hydrolysis2..pdfwhat numbers go with these descriptions.1. Uses ATP hydrolysis2..pdf
what numbers go with these descriptions.1. Uses ATP hydrolysis2..pdf
 
What are the three forms of Business Organizations Answer the follow.pdf
What are the three forms of Business Organizations Answer the follow.pdfWhat are the three forms of Business Organizations Answer the follow.pdf
What are the three forms of Business Organizations Answer the follow.pdf
 
Anatomy Question Use your own words.A girl with a defective heart.pdf
Anatomy Question Use your own words.A girl with a defective heart.pdfAnatomy Question Use your own words.A girl with a defective heart.pdf
Anatomy Question Use your own words.A girl with a defective heart.pdf
 
Why parkinsons disease is special among the different neurological.pdf
Why parkinsons disease is special among the different neurological.pdfWhy parkinsons disease is special among the different neurological.pdf
Why parkinsons disease is special among the different neurological.pdf
 
Which statement is not true promoters are transcribed the Pribnow .pdf
Which statement is not true  promoters are transcribed  the Pribnow .pdfWhich statement is not true  promoters are transcribed  the Pribnow .pdf
Which statement is not true promoters are transcribed the Pribnow .pdf
 
When extracting DNA of an fruit how does the environemnt (how hot or.pdf
When extracting DNA of an fruit how does the environemnt (how hot or.pdfWhen extracting DNA of an fruit how does the environemnt (how hot or.pdf
When extracting DNA of an fruit how does the environemnt (how hot or.pdf
 

Recently uploaded

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 

Router Switeh Routen pe Ping pe Wireless. 7W aicess point DMZ Zone au.pdf

  • 1. Router Switeh Routen pe Ping pe Wireless. 7W aicess point DMZ Zone auess point out ey acess poinf Broadbond wrreless access autess point Servers Solution The logic behind IDS sensors is that they actually try to sniff the route in which your network traffic flows. whereas the IPS(intrusion protection system) is more effective.The IDS has the ability to only detect the uneven activity but can't do with the help of IPS feature. if a user want to check or sniff all the traffic when the user is connected to the outside world(internet) just set the IDS outside the firewal. if a user want to check the traffic which is flowing inside the network whether malicious or not the best idea would be to install IDS inside the firewall. the DMZ zone is also said as(demilitarized zone) is a sub-network where the internal network( internal LAN) is seperated from the other untrusted network like the internet. the external servers,or the resources and services are located in the DMZ so they are easily accessible from the Internet but the other part of the internal LAN remains safe as it is not reacheble.it restricts the ability of hackers to directly access the internal servers present in a network as well as the data also with the help of accessing Internet. the best way to put IPS/IDS is near the firewal(outside the firewal) so can manage every traffic comming from outside like internet and if the traffic seems suspicious can simply block the packet or traffic outside the network only. IDS is expensive so it can't be use at many areas but the best to use is near firewall only.