idp-售后培训-c2-intrusionconcepts.pdfVIP

  • 1
  • 0
  • 约5.74万字
  • 约 35页
  • 2018-11-04 发布于湖北
  • 举报
idp-售后培训-c2-intrusionconcepts

Implementing Intrusion Detection and Prevention Chapter 2: Intrusion Detection and Prevention Concepts Implementing Intrusion Detection and Prevention Chapter Objectives After successfully completing this chapter, you will be able to: •Describe network attack phases and detection methods •Describe the Juniper Networks IDP products •Describe the IDP three-tier architecture •Describe the common IDP deployment modes 2-2 Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential This Chapter Discusses: • Network attack phases and detection methods; • Juniper Intrusion Detection and Prevention (IDP) products; • IDP three-tier architecture; and • Common IDP deployment modes. Chapter 2–2 • Intrusion Detection and Prevention Concepts Implementing Intrusion Detection and Prevention Agenda: Intrusion Detection and Prevention Concepts Network Attack Phases and Detection Juniper Networks IDP Product Offerings Juniper Networks IDP Three-Tier Architecture Juniper Networks IDP Deployment Modes 2-3 Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential Network Attack Phases and Detection The slide lists the topics we discuss in this chapter. We discuss the highlighted topic first. Intrusion Detection and

文档评论(0)

1亿VIP精品文档

相关文档