SlideShare a Scribd company logo
Router Switeh Routen pe Ping pe Wireless. 7W aicess point DMZ Zone auess point out ey acess
poinf Broadbond wrreless access autess point Servers
Solution
The logic behind IDS sensors is that they actually try to sniff the route in which your network
traffic flows.
whereas the IPS(intrusion protection system) is more effective.The IDS has the ability to only
detect the uneven activity but can't do with the help of IPS feature.
if a user want to check or sniff all the traffic when the user is connected to the outside
world(internet) just set the IDS outside the firewal.
if a user want to check the traffic which is flowing inside the network whether malicious or not
the best idea would be to install IDS inside the firewall.
the DMZ zone is also said as(demilitarized zone) is a sub-network where the internal network(
internal LAN) is seperated from the other untrusted network like the internet. the external
servers,or the resources and services are located in the DMZ so they are easily accessible from
the Internet but the other part of the internal LAN remains safe as it is not reacheble.it restricts
the ability of hackers to directly access the internal servers present in a network as well as the
data also with the help of accessing Internet.
the best way to put IPS/IDS is near the firewal(outside the firewal) so can manage every traffic
comming from outside like internet and if the traffic seems suspicious can simply block the
packet or traffic outside the network only.
IDS is expensive so it can't be use at many areas but the best to use is near firewall only.

More Related Content

Similar to Router Switeh Routen pe Ping pe Wireless. 7W aicess point DMZ Zone au.pdf

ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012
ClubHack
 
Intrusion Detection in WLANs
Intrusion Detection in WLANsIntrusion Detection in WLANs
Intrusion Detection in WLANs
ronrulzzz
 
Cours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptxCours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptx
ssuserc517ee1
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Akhil Kumar
 
Comparison of network intrusion detection
Comparison of network intrusion detectionComparison of network intrusion detection
Comparison of network intrusion detection
mtamilpriya
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
researchinventy
 
CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter Security
Sam Bowne
 
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
IJERA Editor
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
Preshan Pradeepa
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
IRJET Journal
 
IDS n IPS
IDS n IPSIDS n IPS
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
whitehat 'People'
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)
Netwax Lab
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
Disha Bedi
 
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and DemeritsSignature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
david rom
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention
MohammedAlmuhaimeed
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Roshan Ranabhat
 
Intrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring SystemIntrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring System
IJERA Editor
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
hidivin652
 
The Need For IoT Gateway.docx
The Need For IoT Gateway.docxThe Need For IoT Gateway.docx
The Need For IoT Gateway.docx
SVITSEEERK
 

Similar to Router Switeh Routen pe Ping pe Wireless. 7W aicess point DMZ Zone au.pdf (20)

ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012
 
Intrusion Detection in WLANs
Intrusion Detection in WLANsIntrusion Detection in WLANs
Intrusion Detection in WLANs
 
Cours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptxCours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptx
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Comparison of network intrusion detection
Comparison of network intrusion detectionComparison of network intrusion detection
Comparison of network intrusion detection
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
 
CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter Security
 
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
 
IDS n IPS
IDS n IPSIDS n IPS
IDS n IPS
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
 
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and DemeritsSignature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring SystemIntrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring System
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 
The Need For IoT Gateway.docx
The Need For IoT Gateway.docxThe Need For IoT Gateway.docx
The Need For IoT Gateway.docx
 

More from amrishinda

JAVA A double-ended queue is a list that allows the addition and.pdf
JAVA A double-ended queue is a list that allows the addition and.pdfJAVA A double-ended queue is a list that allows the addition and.pdf
JAVA A double-ended queue is a list that allows the addition and.pdf
amrishinda
 
Let f(z) be an entire function such that fn+1(z) equivalent 0, Prove.pdf
Let f(z) be an entire function such that fn+1(z) equivalent 0, Prove.pdfLet f(z) be an entire function such that fn+1(z) equivalent 0, Prove.pdf
Let f(z) be an entire function such that fn+1(z) equivalent 0, Prove.pdf
amrishinda
 
Implement threads and a GUI interface using advanced Java Swing clas.pdf
Implement threads and a GUI interface using advanced Java Swing clas.pdfImplement threads and a GUI interface using advanced Java Swing clas.pdf
Implement threads and a GUI interface using advanced Java Swing clas.pdf
amrishinda
 
If a cells contents are greatly hypo-osmotic to the surrounding env.pdf
If a cells contents are greatly hypo-osmotic to the surrounding env.pdfIf a cells contents are greatly hypo-osmotic to the surrounding env.pdf
If a cells contents are greatly hypo-osmotic to the surrounding env.pdf
amrishinda
 
How are the forelimbs of humans, the wings of birds, the wings of ba.pdf
How are the forelimbs of humans, the wings of birds, the wings of ba.pdfHow are the forelimbs of humans, the wings of birds, the wings of ba.pdf
How are the forelimbs of humans, the wings of birds, the wings of ba.pdf
amrishinda
 
Fom 1120, Sched Mark for follow up Question 15 of 105. A corporat.pdf
Fom 1120, Sched Mark for follow up Question 15 of 105. A corporat.pdfFom 1120, Sched Mark for follow up Question 15 of 105. A corporat.pdf
Fom 1120, Sched Mark for follow up Question 15 of 105. A corporat.pdf
amrishinda
 
Germ cells are set aside during animal development and give rise to .pdf
Germ cells are set aside during animal development and give rise to .pdfGerm cells are set aside during animal development and give rise to .pdf
Germ cells are set aside during animal development and give rise to .pdf
amrishinda
 
Determine the missing amounts. (Hint For example, to solve for (a), .pdf
Determine the missing amounts. (Hint For example, to solve for (a), .pdfDetermine the missing amounts. (Hint For example, to solve for (a), .pdf
Determine the missing amounts. (Hint For example, to solve for (a), .pdf
amrishinda
 
Discuss the various methods of intellectual property protection avai.pdf
Discuss the various methods of intellectual property protection avai.pdfDiscuss the various methods of intellectual property protection avai.pdf
Discuss the various methods of intellectual property protection avai.pdf
amrishinda
 
devise a hypothesis that explains the geographical distribution of m.pdf
devise a hypothesis that explains the geographical distribution of m.pdfdevise a hypothesis that explains the geographical distribution of m.pdf
devise a hypothesis that explains the geographical distribution of m.pdf
amrishinda
 
Describe a diode array detector and CCD camera. Differentiate betwee.pdf
Describe a diode array detector and CCD camera. Differentiate betwee.pdfDescribe a diode array detector and CCD camera. Differentiate betwee.pdf
Describe a diode array detector and CCD camera. Differentiate betwee.pdf
amrishinda
 
Connect a motor, two push buttons and two LEDS to the Arduino as sho.pdf
Connect a motor, two push buttons and two LEDS to the Arduino as sho.pdfConnect a motor, two push buttons and two LEDS to the Arduino as sho.pdf
Connect a motor, two push buttons and two LEDS to the Arduino as sho.pdf
amrishinda
 
Consider managers (supervisors) that you have worked for in the past.pdf
Consider managers (supervisors) that you have worked for in the past.pdfConsider managers (supervisors) that you have worked for in the past.pdf
Consider managers (supervisors) that you have worked for in the past.pdf
amrishinda
 
Caterpillar is one of the Americas major exporters. The company sell.pdf
Caterpillar is one of the Americas major exporters. The company sell.pdfCaterpillar is one of the Americas major exporters. The company sell.pdf
Caterpillar is one of the Americas major exporters. The company sell.pdf
amrishinda
 
what numbers go with these descriptions.1. Uses ATP hydrolysis2..pdf
what numbers go with these descriptions.1. Uses ATP hydrolysis2..pdfwhat numbers go with these descriptions.1. Uses ATP hydrolysis2..pdf
what numbers go with these descriptions.1. Uses ATP hydrolysis2..pdf
amrishinda
 
What are the three forms of Business Organizations Answer the follow.pdf
What are the three forms of Business Organizations Answer the follow.pdfWhat are the three forms of Business Organizations Answer the follow.pdf
What are the three forms of Business Organizations Answer the follow.pdf
amrishinda
 
Anatomy Question Use your own words.A girl with a defective heart.pdf
Anatomy Question Use your own words.A girl with a defective heart.pdfAnatomy Question Use your own words.A girl with a defective heart.pdf
Anatomy Question Use your own words.A girl with a defective heart.pdf
amrishinda
 
Why parkinsons disease is special among the different neurological.pdf
Why parkinsons disease is special among the different neurological.pdfWhy parkinsons disease is special among the different neurological.pdf
Why parkinsons disease is special among the different neurological.pdf
amrishinda
 
Which statement is not true promoters are transcribed the Pribnow .pdf
Which statement is not true  promoters are transcribed  the Pribnow .pdfWhich statement is not true  promoters are transcribed  the Pribnow .pdf
Which statement is not true promoters are transcribed the Pribnow .pdf
amrishinda
 
When extracting DNA of an fruit how does the environemnt (how hot or.pdf
When extracting DNA of an fruit how does the environemnt (how hot or.pdfWhen extracting DNA of an fruit how does the environemnt (how hot or.pdf
When extracting DNA of an fruit how does the environemnt (how hot or.pdf
amrishinda
 

More from amrishinda (20)

JAVA A double-ended queue is a list that allows the addition and.pdf
JAVA A double-ended queue is a list that allows the addition and.pdfJAVA A double-ended queue is a list that allows the addition and.pdf
JAVA A double-ended queue is a list that allows the addition and.pdf
 
Let f(z) be an entire function such that fn+1(z) equivalent 0, Prove.pdf
Let f(z) be an entire function such that fn+1(z) equivalent 0, Prove.pdfLet f(z) be an entire function such that fn+1(z) equivalent 0, Prove.pdf
Let f(z) be an entire function such that fn+1(z) equivalent 0, Prove.pdf
 
Implement threads and a GUI interface using advanced Java Swing clas.pdf
Implement threads and a GUI interface using advanced Java Swing clas.pdfImplement threads and a GUI interface using advanced Java Swing clas.pdf
Implement threads and a GUI interface using advanced Java Swing clas.pdf
 
If a cells contents are greatly hypo-osmotic to the surrounding env.pdf
If a cells contents are greatly hypo-osmotic to the surrounding env.pdfIf a cells contents are greatly hypo-osmotic to the surrounding env.pdf
If a cells contents are greatly hypo-osmotic to the surrounding env.pdf
 
How are the forelimbs of humans, the wings of birds, the wings of ba.pdf
How are the forelimbs of humans, the wings of birds, the wings of ba.pdfHow are the forelimbs of humans, the wings of birds, the wings of ba.pdf
How are the forelimbs of humans, the wings of birds, the wings of ba.pdf
 
Fom 1120, Sched Mark for follow up Question 15 of 105. A corporat.pdf
Fom 1120, Sched Mark for follow up Question 15 of 105. A corporat.pdfFom 1120, Sched Mark for follow up Question 15 of 105. A corporat.pdf
Fom 1120, Sched Mark for follow up Question 15 of 105. A corporat.pdf
 
Germ cells are set aside during animal development and give rise to .pdf
Germ cells are set aside during animal development and give rise to .pdfGerm cells are set aside during animal development and give rise to .pdf
Germ cells are set aside during animal development and give rise to .pdf
 
Determine the missing amounts. (Hint For example, to solve for (a), .pdf
Determine the missing amounts. (Hint For example, to solve for (a), .pdfDetermine the missing amounts. (Hint For example, to solve for (a), .pdf
Determine the missing amounts. (Hint For example, to solve for (a), .pdf
 
Discuss the various methods of intellectual property protection avai.pdf
Discuss the various methods of intellectual property protection avai.pdfDiscuss the various methods of intellectual property protection avai.pdf
Discuss the various methods of intellectual property protection avai.pdf
 
devise a hypothesis that explains the geographical distribution of m.pdf
devise a hypothesis that explains the geographical distribution of m.pdfdevise a hypothesis that explains the geographical distribution of m.pdf
devise a hypothesis that explains the geographical distribution of m.pdf
 
Describe a diode array detector and CCD camera. Differentiate betwee.pdf
Describe a diode array detector and CCD camera. Differentiate betwee.pdfDescribe a diode array detector and CCD camera. Differentiate betwee.pdf
Describe a diode array detector and CCD camera. Differentiate betwee.pdf
 
Connect a motor, two push buttons and two LEDS to the Arduino as sho.pdf
Connect a motor, two push buttons and two LEDS to the Arduino as sho.pdfConnect a motor, two push buttons and two LEDS to the Arduino as sho.pdf
Connect a motor, two push buttons and two LEDS to the Arduino as sho.pdf
 
Consider managers (supervisors) that you have worked for in the past.pdf
Consider managers (supervisors) that you have worked for in the past.pdfConsider managers (supervisors) that you have worked for in the past.pdf
Consider managers (supervisors) that you have worked for in the past.pdf
 
Caterpillar is one of the Americas major exporters. The company sell.pdf
Caterpillar is one of the Americas major exporters. The company sell.pdfCaterpillar is one of the Americas major exporters. The company sell.pdf
Caterpillar is one of the Americas major exporters. The company sell.pdf
 
what numbers go with these descriptions.1. Uses ATP hydrolysis2..pdf
what numbers go with these descriptions.1. Uses ATP hydrolysis2..pdfwhat numbers go with these descriptions.1. Uses ATP hydrolysis2..pdf
what numbers go with these descriptions.1. Uses ATP hydrolysis2..pdf
 
What are the three forms of Business Organizations Answer the follow.pdf
What are the three forms of Business Organizations Answer the follow.pdfWhat are the three forms of Business Organizations Answer the follow.pdf
What are the three forms of Business Organizations Answer the follow.pdf
 
Anatomy Question Use your own words.A girl with a defective heart.pdf
Anatomy Question Use your own words.A girl with a defective heart.pdfAnatomy Question Use your own words.A girl with a defective heart.pdf
Anatomy Question Use your own words.A girl with a defective heart.pdf
 
Why parkinsons disease is special among the different neurological.pdf
Why parkinsons disease is special among the different neurological.pdfWhy parkinsons disease is special among the different neurological.pdf
Why parkinsons disease is special among the different neurological.pdf
 
Which statement is not true promoters are transcribed the Pribnow .pdf
Which statement is not true  promoters are transcribed  the Pribnow .pdfWhich statement is not true  promoters are transcribed  the Pribnow .pdf
Which statement is not true promoters are transcribed the Pribnow .pdf
 
When extracting DNA of an fruit how does the environemnt (how hot or.pdf
When extracting DNA of an fruit how does the environemnt (how hot or.pdfWhen extracting DNA of an fruit how does the environemnt (how hot or.pdf
When extracting DNA of an fruit how does the environemnt (how hot or.pdf
 

Recently uploaded

Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 

Recently uploaded (20)

Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 

Router Switeh Routen pe Ping pe Wireless. 7W aicess point DMZ Zone au.pdf

  • 1. Router Switeh Routen pe Ping pe Wireless. 7W aicess point DMZ Zone auess point out ey acess poinf Broadbond wrreless access autess point Servers Solution The logic behind IDS sensors is that they actually try to sniff the route in which your network traffic flows. whereas the IPS(intrusion protection system) is more effective.The IDS has the ability to only detect the uneven activity but can't do with the help of IPS feature. if a user want to check or sniff all the traffic when the user is connected to the outside world(internet) just set the IDS outside the firewal. if a user want to check the traffic which is flowing inside the network whether malicious or not the best idea would be to install IDS inside the firewall. the DMZ zone is also said as(demilitarized zone) is a sub-network where the internal network( internal LAN) is seperated from the other untrusted network like the internet. the external servers,or the resources and services are located in the DMZ so they are easily accessible from the Internet but the other part of the internal LAN remains safe as it is not reacheble.it restricts the ability of hackers to directly access the internal servers present in a network as well as the data also with the help of accessing Internet. the best way to put IPS/IDS is near the firewal(outside the firewal) so can manage every traffic comming from outside like internet and if the traffic seems suspicious can simply block the packet or traffic outside the network only. IDS is expensive so it can't be use at many areas but the best to use is near firewall only.