1) You can specify two block actions on IPS
1a) Request Block Host (sensor blocks all traffic from the host that triggered the signature)
1b) Request Block Connection (blocks only traffic from the host to the destination port of the traffic that triggered the signature
2)You can specify "block time" on IPS - The default blocking duration is 30 minutes
3)Because IDS is outside of the forwarding path, one or more attack packets might reach the target before the response action can be activated ... How is it serious??? It depends for some attacks its no problem BUT IDS cannot stop fox example Atomic attacks that use only one packet for the attack
4) Its INLINE function - IPS is Positioned directly in the packet-forwarding path as a Layer 2 bridge Analyzes data as it travels
between two interfaces.
IPS also has Aplication level inspection
and Risk rating features what IDS hasnt
M.