<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Query!! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/query/m-p/1038945#M896022</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA MPF has some specific Protocols engines covering various filtering options. With IPS/IDS you have access to an expanded range of conformance checks against traffic. Signatures can updated periodically for newer threats, with ASA MPF configuration might not always be possible for newer threats or for protocols not covered by applications engines&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vikram&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 23 Sep 2008 16:45:27 GMT</pubDate>
    <dc:creator>vvarakan</dc:creator>
    <dc:date>2008-09-23T16:45:27Z</dc:date>
    <item>
      <title>Query!!</title>
      <link>https://community.cisco.com/t5/network-security/query/m-p/1038944#M896019</link>
      <description>&lt;P&gt;Hi, During these days I am trying to understand IPS and IDS concepts. I just want to know how is different an IPS device from Firewall in the terms of traffic blocking as I know we can handle the traffic on ASA FW by using MPF then why we require IPS. Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:48:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query/m-p/1038944#M896019</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2019-03-11T13:48:02Z</dc:date>
    </item>
    <item>
      <title>Re: Query!!</title>
      <link>https://community.cisco.com/t5/network-security/query/m-p/1038945#M896022</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA MPF has some specific Protocols engines covering various filtering options. With IPS/IDS you have access to an expanded range of conformance checks against traffic. Signatures can updated periodically for newer threats, with ASA MPF configuration might not always be possible for newer threats or for protocols not covered by applications engines&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vikram&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Sep 2008 16:45:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query/m-p/1038945#M896022</guid>
      <dc:creator>vvarakan</dc:creator>
      <dc:date>2008-09-23T16:45:27Z</dc:date>
    </item>
    <item>
      <title>Re: Query!!</title>
      <link>https://community.cisco.com/t5/network-security/query/m-p/1038946#M896026</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Vikram!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Sep 2008 03:57:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query/m-p/1038946#M896026</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2008-09-24T03:57:10Z</dc:date>
    </item>
  </channel>
</rss>

