1-5
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
Chapter 1 Introducing the Sensor
Appliances
Figure 1-1
Major Types of Network Connections
In location one, the appliance is placed to monitor traffic between the
E-commerce (protected) network and the Internet. This is referred to as perimeter
protection and is the most common deployment for an appliance. This location
can be shared with firewall protection and is discussed in
Placing an Appliance on
Your Network, page 1-6
.
In location two, the appliance is monitoring an extranet connection with a
business partner. Although most companies have defined policies on the use and
security of this type of connection, there is no guarantee that the network of a
partner is adequately protected. Consequently, an outsider may enter your
network through this type of connection. These extranet connections may have
firewalls as well.
In location three, the appliance is monitoring the network side of a remote access
server. Although this connection may be only for employee use, it could be
vulnerable to external attack.
In location four, the appliance is monitoring an intranet connection. For example,
the protected network of one department may contain an e-commerce site where
all the access types described so far are required. The network of another
department may contain company-specific research and development or other
engineering information and should be given additional protection.
Business
partner
Internet
E-commerce
network
Dial-up
server
Research and
Development
network
Appliance
83874
Appliance
Appliance
Appliance
1
3
4
2
Summary of Contents for IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor
Page 4: ......
Page 450: ...Appendix B Troubleshooting ...