FAQ Network Instrusion Prevention Systems IPS
FAQ Network Instrusion Prevention Systems IPS
FAQ Network Instrusion Prevention Systems IPS
Introduction
Deploying updates and patches to devices and servers in large enterprise and service provider networks can be a complex
and time-consuming process. Following a patch release, it might often take weeks or even months for a large organization to
deploy the fix to all affected systems. This opens a window of opportunity for external threats or even malicious insiders to
penetrate unpatched systems, steal valuable information, and sabotage networks. Intrusion Detection Systems can detect
attacks, but cannot act in real time to block them. Only a network Intrusion Prevention System (IPS) can detect and block
attacks before damage has been done. Most network security vendors now offer an IPS, however many of these solutions
fall short because they force customers to choose between acceptable network security and business continuity. This
document provides answers to questions that are often asked about Intrusion Prevention Systems, and also details
important security features that you should consider when choosing the best network security solution for your organization.
What is a network IPS and how is it different from an Intrusion Detection System?
Network IPS performs in-line inspection of network traffic in a near-real-time manner. The inspection identifies attacks using
known vulnerabilities of commonly used software products and protocols, as well as known attack patterns with unusual
activity based on connection sequences or traffic volume 1.
Intrusion Prevention Systems are considered extensions of Intrusion Detection Systems because both systems monitor
network traffic and/or system activity for threats. The primary difference between the two systems is that Intrusion
Prevention Systems are placed in-line and are therefore able to actively prevent/block intrusions that are detected. More
specifically, an IPS can take such actions as sending an alarm, dropping malicious packets, resetting the connection and/or
blocking traffic from an offending IP address. An IPS can also correct Cyclic Redundancy Check (CRC) errors, defragment
packet streams, prevent TCP sequencing issues, and clean up unwanted transport and network layer options 2.
1 Gartner Magic Quadrant for Network Intrusion Prevention Systems, December 2010
2 Computer Security: Protecting Digital Resources, Robert C. Newman, February 2009; Principles of Information Security, Michael E.
Whitman, Herbert J. Mattord, 2009
3 LulzSec Disbands: The Attacks Live On, Infosec Island, June 2011
4 2010 Annual Study: Global Cost of a Data Breach, Ponemon Institute, LLC
FORTINET – Network Intrusion Prevention Systems (IPS) PAGE 3
I just installed a new IPS. Why are my users still complaining about slow connections?
According to analysts, IPS has two primary performance drivers; the handling of network traffic at near wire speeds, and the
deep inspection of traffic based on signatures, rules and policy. The load on both aspects is increasing radically. Enterprise
network traffic is growing in bandwidth, complexity of connections and protocols, and connections per second. Inspection
load is increasing as new signatures are introduced and old ones do not go away1.
Some network security vendors have added new inspection capabilities and features onto their IPS platforms without
sufficiently upgrading the ability of their hardware to handle the added tasks and network traffic. Purpose-built hardware is
now a necessity when attempting to do deep packet inspection at wire speeds in today’s high speed next-generation
networks. Vendors who skimp on the hardware side and try to use commodity, industry-standard servers may not have the
horsepower necessary to effectively process packets in near real time 5.
In addition, purpose-built FortiASIC™ Security Processors, built into certain FortiGate® appliances and modules, accelerate
IPS functions by offloading resource intensive tasks such as IPS signature scanning. Designed with performance in mind,
FortiASIC Network Processors and Content Processors help Fortinet consolidated security appliances deliver wire-speed
firewall throughput and accelerated content inspection. Available with all FortiGate and FortiWiFi™ platforms, Fortinet IPS
offers a wide range of features that can be used to monitor and block malicious activity such as:
IPS sensors
IPS sensors may be configured to apply specific inspection signatures to selected traffic. Actions can be assigned to block,
pass, or reset any suspicious traffic. IPS sensors may also be used to enable packet logging for each signature, or to pass
traffic from certain IP addresses without further inspection. On the flip side, IPS sensors can prevent attacks from spreading
by quarantining all traffic originating from an attack source, sent to an attack destination, or received by the FortiGate device.
IPS sensors are populated with filters and custom signature entries. Attributes can be set to classify traffic by severity, target
(client/server), OS, protocol, application, and tags. Specifying more or fewer attributes widens or narrows the focus of the
sensor. Custom signature entries can be created to include or exclude signatures on an individual basis. Custom signatures
can also specify actions such as logging, packet logging and filtering, attacker quarantine, and exempt IP address settings.
Fortinet IPS sensors can be accessed through the FortiGate management interface as shown below in Fig. 1.
FortiGuard® Services
Backed by automatic, real-time updates delivered by FortiGuard Services, FortiGate IPS technology leverages a database
of thousands of unique attack signatures to stop attacks that might evade conventional firewall defenses, plus anomaly-
based detection that enables the system to recognize threats for which no signature has yet been developed. The
combination of known and unknown threat prevention, plus tight integration with other Fortinet security technologies,
enables FortiGate systems to stop attacks regardless of whether your network is wired or wireless, a partner extranet, or
connected to a branch office.
Does Fortinet IPS integrate with other security technologies to detect and block attacks?
An essential component of the Fortinet next-generation security platform, Fortinet IPS works in concert with Fortinet
application control and user identification technologies to ensure that only approved traffic, applications and users are given
access to your network. Following are just a few of the important security features that are integral to Fortinet products, and
work collaboratively with Fortinet IPS to provide complete security for your network:
Application Control
A primary requirement and driver for adoption of next-generation firewalls is application control. In order
to prevent data loss and mitigate new threats, organizations must be able to effectively control legacy
applications as well as the new breed of Internet-based applications. Next-generation application control
must be able to detect, monitor, and control the usage of applications and any associated traffic flows at
gateways and at endpoints, regardless of ports and protocols used. In addition, an association must be
made between the application and the end user before the proper access rights and security policy can be assigned.
Using the Application Control feature included in FortiGate® platforms, businesses and agencies can detect and restrict the
use of applications on their networks and endpoints based on application classification, behavioral analysis, and end user
association. Network administrators can define and enforce policies for thousands of applications running on next-
generation networks and endpoints. They can detect and control individual features of Web 2.0 applications such as
Facebook, Skype, Twitter and Salesforce.com such as allowing chat but disabling the ability to download videos or following
links.
Conclusion
FortiGate consolidated security physical and virtual appliances from Fortinet are field-proven, purpose-built security
platforms that include rock-solid traditional security technologies, as well as protection against next-generation threats such
as Advanced Persistent Threats, or APTs, and threats targeting mobile devices. Because Fortinet develops all security
technologies in-house (instead of licensing crucial security features from third parties), all FortiGate platforms include finely
tuned, hardware-accelerated protective technologies that can integrate new security technologies and scale effortlessly with
any size of fast-growing business and any network environment. Fortinet also provides in-depth monitoring and reporting
capabilities to alert administrators and users to threats, and to allow further analysis for fine tuning. When combined with
FortiGuard Services, FortiGate consolidated security appliances protect your next-generation network and your business
against threats now and into the future.
FORTINET – Network Intrusion Prevention Systems (IPS) PAGE 8
About Fortinet
Fortinet delivers unified threat management and specialized security solutions that block today’s sophisticated threats. Our
consolidated architecture enables our customers to deploy fully integrated security technologies in a single device, delivering
increased performance, improved protection, and reduced costs. Purpose-built hardware and software provide the high
performance and complete content protection our customers need to stay abreast of a constantly evolving threat landscape.
Our customers rely on Fortinet to protect their constantly evolving networks in every industry and region in the world. They
deploy a robust defense-in-depth strategy that improves their security posture, simplifies their security infrastructure, and
reduces their overall cost of ownership.
About FortiOS
FortiOS™ is a security-hardened, purpose-built operating system that is the software foundation of FortiGate consolidated
security platforms. FortiOS software enables high performance multi-threat security by leveraging the hardware acceleration
provided by FortiASIC™ content and network processors. This combination of custom hardware and software gives you the
best security and performance possible from a single device. FortiOS helps you stop the latest, most sophisticated, and
dynamic threats facing your network today with expert threat intelligence delivered via FortiGuard Security Subscription
Services.
FortiOS 4.0 software redefines network security by extending the scope of integrated security and networking capabilities
within the FortiGate consolidated security platform. Regardless of the size of your organization, you can benefit from the
most comprehensive suite of security and networking services within a single device on the market today.
FAQ-IPS-201112