<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco.com server settings in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-com-server-settings/m-p/1552816#M66143</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You would need to open a case with Cisco TAC to assist you with reporting the new vulnerability or possibly double checking if the signature is on its way to be released.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 20 Nov 2010 00:01:48 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2010-11-20T00:01:48Z</dc:date>
    <item>
      <title>Cisco.com server settings</title>
      <link>https://community.cisco.com/t5/network-security/cisco-com-server-settings/m-p/1552813#M66140</link>
      <description>&lt;P&gt;On the IPS 4260-k9 under the cisco.com server settings the url is the default but there is a section that states Username and Password. I put my CCO id information in this location. And when I go to the url that is in there it brings me to a page that is no longer valid. Is this URL accessible on the web or is it only assessable via the IPS?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:11:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-com-server-settings/m-p/1552813#M66140</guid>
      <dc:creator>tonicameron</dc:creator>
      <dc:date>2019-03-10T12:11:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco.com server settings</title>
      <link>https://community.cisco.com/t5/network-security/cisco-com-server-settings/m-p/1552814#M66141</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, the URL can't be browsed from a browser, it's only accessible from IPS auto update.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you would like to test for your CCO ID, you can go to cisco.com software download page, and see if you can manually download the signature pack with your CCO ID.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Nov 2010 23:47:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-com-server-settings/m-p/1552814#M66141</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-11-19T23:47:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco.com server settings</title>
      <link>https://community.cisco.com/t5/network-security/cisco-com-server-settings/m-p/1552815#M66142</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Perfect Thanks. If there is a new vulnerability like Stuxnet, how can we get a signature for this if it wasn't in the latest update?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Nov 2010 23:51:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-com-server-settings/m-p/1552815#M66142</guid>
      <dc:creator>tonicameron</dc:creator>
      <dc:date>2010-11-19T23:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco.com server settings</title>
      <link>https://community.cisco.com/t5/network-security/cisco-com-server-settings/m-p/1552816#M66143</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You would need to open a case with Cisco TAC to assist you with reporting the new vulnerability or possibly double checking if the signature is on its way to be released.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Nov 2010 00:01:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-com-server-settings/m-p/1552816#M66143</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-11-20T00:01:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco.com server settings</title>
      <link>https://community.cisco.com/t5/network-security/cisco-com-server-settings/m-p/1552817#M66144</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you so much&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Nov 2010 00:03:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-com-server-settings/m-p/1552817#M66144</guid>
      <dc:creator>tonicameron</dc:creator>
      <dc:date>2010-11-20T00:03:40Z</dc:date>
    </item>
  </channel>
</rss>

