Case Study Deployment of IDS Sensors in the Organization and Their Typical Placement

The IDS case study covers the placement of the IDS equipment in an actual situation. The case study includes the setup and configuration of IDSs in a customer's environment with a few screenshots of the customer's network under attack. This practical example shows how organizations can inspect and monitor overall network activity using IDSs to protect their assets.

Figure 10-19 and Figure 10-20 illustrate the Company XYZ network diagram for this scenario. An Internet user (cracker) is connected via a public connection to Company XYZ headquarters, with the intention of hacking into one of the web servers (WebServer1). The server has been attacked frequently before, and the network administrator wants to implement a solid solution using a network IDS configured for IP blocking.

Figure 10-19. Company XYZ Top-Level Network Layout

[View full size imagel

Figure 10-19. Company XYZ Top-Level Network Layout

[View full size imagel

iDSOimöw ACS CA

Figure 10-20. Company XYZ Network Layout

Figure 10-20. Company XYZ Network Layout

Placement Network

Figure 10-20 is a closer look at parts of Figure 10-19 so that only the relevant devices for this case study are displayed.

Was this article helpful?

0 0

Post a comment