Answering this question is quite a lengthy process. There are factors that need to be considered as to what the best option is.
Richard should replace this with an active TAP as you need a TAP so this is the only other option. The question talks about changing from IDS to IPS, although in most cases it would work better with the two running together but within different parts of the firewall. This will usually give the desired effect but there is a lengthy process in learning how to do this. Another factor to consider is the security of the network. Who’s network is it? Is it a personal network? Companies (especially larger ones) financial institutions and holders of personal data (whether large or small companies) have specific specifications for their security systems.
My advice would be to use one of four methods to find the definitive answer for a specific situation. These are; your local library, a tutor, course books that you have on this specific question, a college tutor that specialises in this subject and is familiar in networking or probably the most likely to have a definitive answer will be an IT networking technician.
Your library can help in locating the books for this as it will require extensive reading and looking into different options is always a great way to learn, especially if this is something that you will deal with a lot as there are multiple options with different networks.
Both an IT networking technician or a college tutor will be able to give you an answer and will also be able to explain to you what the differences are between networks and how this method can be implemented in a network, not just on paper.
Richard should replace this with an active TAP as you need a TAP so this is the only other option. The question talks about changing from IDS to IPS, although in most cases it would work better with the two running together but within different parts of the firewall. This will usually give the desired effect but there is a lengthy process in learning how to do this. Another factor to consider is the security of the network. Who’s network is it? Is it a personal network? Companies (especially larger ones) financial institutions and holders of personal data (whether large or small companies) have specific specifications for their security systems.
My advice would be to use one of four methods to find the definitive answer for a specific situation. These are; your local library, a tutor, course books that you have on this specific question, a college tutor that specialises in this subject and is familiar in networking or probably the most likely to have a definitive answer will be an IT networking technician.
Your library can help in locating the books for this as it will require extensive reading and looking into different options is always a great way to learn, especially if this is something that you will deal with a lot as there are multiple options with different networks.
Both an IT networking technician or a college tutor will be able to give you an answer and will also be able to explain to you what the differences are between networks and how this method can be implemented in a network, not just on paper.