An Intrusion Prevention System IPS is a network security device used for threat preventions. In order to detect and prevent vulnerability exploits, it examines network traffic flows. Vulnerability exploits are a form of malicious inputs that can be used for taking control of an application or a computer. The attacker can potentially access all the rights and permissions available to the compromised application or even disable it. This is known as a denial-of-service state.
NGIPS has the ability to inspect asymmetric data flows because this device does not maintain a state table, which means that it is less vulnerable to attacks that exploit state table exhaustion that results in denial of service. The NGIPS performs deep packet inspection, but it is a transparent device. That means that traffic can flow through the network as if NGIPS is not present.
Below are a few examples of NGIPS devices:
Note: If you would like to learn more about the different NGIPS devices, use your favourite search engine to research this topic in more detail. There are no screenshot items for this exercise.
Exercise 5 - Access Points
An access point is a networking device that allows a connection to be established between a wired and a wireless network. They are usually used in an office or large building.
Most access points have built-in routers, but there are also models that need to be connected separately to a router in order to provide network access. In either case, APs are typically wired to other devices, such as network switches or broadband modems.
In this exercise, you will learn about access points and their functions in a network.