Understanding Intrusion Detection and Prevention Device Configuration and Integration Overview