<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco FirePOWER Security Intelligence in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-firepower-security-intelligence/m-p/2960055#M18151</link>
    <description>&lt;P&gt;Is there a way to protect my internal network resources from "browser vpn" connections, like Opera VPN with Cisco FirePOWER services? Maybe with Security Intelligence upgrade?&lt;/P&gt;
&lt;P&gt;Sec.Int. has "Open_proxy" category but these connections are passing without any problem.&lt;/P&gt;
&lt;P&gt;How can I investigate an attack when source IP address is masked?&lt;/P&gt;</description>
    <pubDate>Thu, 05 Jan 2017 16:11:33 GMT</pubDate>
    <dc:creator>dosadaubija</dc:creator>
    <dc:date>2017-01-05T16:11:33Z</dc:date>
    <item>
      <title>Cisco FirePOWER Security Intelligence</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-security-intelligence/m-p/2960055#M18151</link>
      <description>&lt;P&gt;Is there a way to protect my internal network resources from "browser vpn" connections, like Opera VPN with Cisco FirePOWER services? Maybe with Security Intelligence upgrade?&lt;/P&gt;
&lt;P&gt;Sec.Int. has "Open_proxy" category but these connections are passing without any problem.&lt;/P&gt;
&lt;P&gt;How can I investigate an attack when source IP address is masked?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jan 2017 16:11:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-security-intelligence/m-p/2960055#M18151</guid>
      <dc:creator>dosadaubija</dc:creator>
      <dc:date>2017-01-05T16:11:33Z</dc:date>
    </item>
    <item>
      <title>Have you tried doing a packet</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-security-intelligence/m-p/2960056#M18165</link>
      <description>&lt;P&gt;Have you tried doing a packet capture whilst opening one yourself and then analyse the packets to see if there is something you can add to an acl to have dropped.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2017 11:03:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-security-intelligence/m-p/2960056#M18165</guid>
      <dc:creator>Kristian Mattocks</dc:creator>
      <dc:date>2017-07-07T11:03:01Z</dc:date>
    </item>
  </channel>
</rss>

