<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic the defferences between IDS &amp; IPS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/the-defferences-between-ids-ips/m-p/1413265#M750645</link>
    <description>&lt;P&gt;dear experts, would you mind describing to me the differences between the IDS, IPS, and the normal functions of the firewall policies in the ASA and PIX firewall?&lt;/P&gt;&lt;P&gt;thanks alot for your help&lt;/P&gt;&lt;P&gt;Labib Makar &lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 17:00:01 GMT</pubDate>
    <dc:creator>hanyawad</dc:creator>
    <dc:date>2019-03-11T17:00:01Z</dc:date>
    <item>
      <title>the defferences between IDS &amp; IPS</title>
      <link>https://community.cisco.com/t5/network-security/the-defferences-between-ids-ips/m-p/1413265#M750645</link>
      <description>&lt;P&gt;dear experts, would you mind describing to me the differences between the IDS, IPS, and the normal functions of the firewall policies in the ASA and PIX firewall?&lt;/P&gt;&lt;P&gt;thanks alot for your help&lt;/P&gt;&lt;P&gt;Labib Makar &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:00:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-defferences-between-ids-ips/m-p/1413265#M750645</guid>
      <dc:creator>hanyawad</dc:creator>
      <dc:date>2019-03-11T17:00:01Z</dc:date>
    </item>
    <item>
      <title>Re: the defferences between IDS &amp; IPS</title>
      <link>https://community.cisco.com/t5/network-security/the-defferences-between-ids-ips/m-p/1413266#M750669</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Calibri;"&gt;&lt;SPAN&gt;Basically IDS (Intrusion Detection System) is a device which can sniff (copy)&amp;nbsp; traffic and analyze (compare against pre-defined signatures) it for any bad behavior or malicious traffic, this means that IDS device can’t be positioned inline in the path of traffic which results of limitation of its capability of protection (it is more Detection not Prevention/Protection).&lt;/SPAN&gt;&lt;/SPAN&gt;So basically, it is a passive-monitoring system which may be used in conjunction with IPS to prevent attacks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Calibri;"&gt;&lt;SPAN&gt;While IPS &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri;"&gt;&lt;SPAN&gt;(Intrusion Prevention System) &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri;"&gt;&lt;SPAN&gt; can be deployed &lt;STRONG&gt;inline&lt;/STRONG&gt; which gives it ability to block malicious / bad traffic before it reaches its destination. But you have to be carful as nowadays you might find device described as IDS which can be deployed inline like Cisco IDSM which is in fact IPS but they are using both names interchangeably.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vijaya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jan 2010 04:59:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-defferences-between-ids-ips/m-p/1413266#M750669</guid>
      <dc:creator>vilaxmi</dc:creator>
      <dc:date>2010-01-22T04:59:54Z</dc:date>
    </item>
  </channel>
</rss>

