Network Intrusion Prevention


  1. Describe the Network Intrusion Prevention System (NIPS) product at a high level.

  2. Is the Network Intrusion Prevention portion of the solution implemented as hardware, software, or both?

  3. What software platforms are supported?

  4. What hardware platforms do you offer?

Functionality

  1. Describe the attack detection techniques your product uses.

  2. Does the product use stateful analysis? If so, describe its use.

  3. What network protocols can be analyzed?

  4. What application protocols can be analyzed?

  5. Can your product operate in both inline and passive mode?

  6. If malicious traffic is detected, what response capabilities does your product have (log, drop packet, and so on)?

  7. How is fragmented traffic handled?

  8. Does the NIPS have any remediation capabilities? If so, describe them.

  9. False positives are an issue for most NIPS products. If we encounter false positives with your products, how do we tune them?

  10. Is there a tuning, learning, or testing mode?

  11. What is the inline throughput and latency for your products?

  12. What is the detection-only throughput and latency for your products?

  13. What information do logged events contain?

  14. Can event severity be modified?

  15. What types of signatures/policies are used (atomic, stateful, and so on)?

  16. What triggering mechanisms does your product use (pattern detection, anomaly-based, behavior-based, and so on)?

  17. Can signatures/policies be applied to specific categories of traffic (VLAN, subnet, IP address)?

  18. Can policies/signatures be customized or created?

  19. Does the product have any application-specific signatures/policies? If so, what applications are included?

  20. What self-defense capabilities does the product have?

  21. Does your product have the capability to detect or stop known attacks? How?

  22. Does your product have the capability to detect or stop unknown attacks? How?

  23. Does your product have the capability to detect or stop network worms? How?

  24. Does your product have the capability to detect or stop Trojans? How?

  25. Does your product have the capability to detect or stop spyware? How?

  26. Does your product have the capability to detect or stop adware? How?

  27. Does your product have the capability to detect or stop viruses? How?

  28. Does your product have the capability to detect or stop traditional hacking attempts? How?

  29. Does your product have the capability to detect or stop encrypted attacks? How?

  30. Does your product have the ability to control bandwidth utilization? How?

  31. Does your product have the ability to enforce acceptable use policies (peer-to-peer file sharing, pornography, and so on)?

  32. Does your product have the ability to enforce security policies (confidentiality of data and so on)?

  33. Can your product isolate malicious traffic/hosts?

  34. Can your product overcome evasion techniques? How?

  35. Are languages other than English supported? If so, describe the level of support and list the languages.

  36. If the product fails, does it fail open or closed?

  37. Please describe the current roadmap for future product releases.

Management

  1. Is the product centrally managed?

  2. Describe the management infrastructure.

  3. Does the management solution have a database component? If so, what type of database?

  4. What architectural options are supported (single-server, tiered, hierarchical)?

  5. How many devices can each architecture (single-server, tiered, hierarchical) support?

  6. Describe the high availability and failover capabilities of the management solution.

  7. How do administrators access the management interface?

  8. How are administrators authenticated?

  9. How is administrator-to-management communication secured?

  10. Is there an audit trail? If so, describe it.

  11. Is role-based administration supported?

  12. How many events can one management server store?

  13. How many events per second can one management server handle?

  14. What are the bandwidth requirements? Describe the communication protocols between the managed devices and the management server.

  15. How does management avoid denial-of-service because of event flooding?

  16. Can a policy/signature be backed out?

  17. What capabilities does the management offer for signature/policy testing before they are deployed?

  18. Describe any centralized notification/alerting capabilities.

  19. Are events collected in real time?

  20. Are alerts delivered in real time?

  21. How can alerts be delivered (e-mail, SNMP, and so on)?

  22. How is device-to-management communication secured?

  23. How is the management infrastructure itself secured?

  24. If your product requires updates, how are the updates distributed? Is it automatic?

  25. How are configuration changes distributed?

  26. Are languages other than English supported? If so, list them.

  27. Can logs be exported?

  28. Describe any capability to group managed devices.

  29. Does the management solution provide detailed status of the devices it manages?

  30. What happens if the management solution fails?

Operations

  1. Describe any reporting capabilities the product might have.

  2. Can custom reports be created?

  3. Describe any backup capabilities the product might have.

  4. Describe any restore capabilities the product might have.

  5. Describe any automatic log archival capabilities the product might have.

Compatibility

  1. What operating systems are supported for the management infrastructure?

  2. Is the product compatible with asset management solutions? If so, list them.

  3. Is the product compatible with any event collection/correlation solutions? If so, list them.

  4. Is the product compatible with any third-party management solutions? If so, list them.




Intrusion Prevention Fundamentals
Intrusion Prevention Fundamentals
ISBN: 1587052393
EAN: 2147483647
Year: N/A
Pages: 115

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net