This document provides an overview of implementing intrusion prevention systems. It describes the purpose and operations of network-based and host-based IPS, how IPS signatures are used to detect malicious traffic, and how to configure and monitor Cisco IOS IPS using the command line interface and Security Device Manager. The objectives are to describe IPS functions, signatures, alarms, actions, and monitoring, as well as configure and verify Cisco IOS IPS.