Snort to Cisco Conversion Utility (Alpha) -- Testing Needed
I'm currently working on a Snort to Cisco Conversion Utility. The goal of the project is to be able to take custom Snort rules and convert them into Cisco syntax (presently CLI for import purposes). I need some help testing the tool and figuring out where to take it from here. I especially need assistance in verifying the conversion process from Snort->Cisco. There's some working code available, but am not handling 100% of the conversion cases at this point. If you think you can assist, please take a look at:
With the enhancements in ISE 3.0 for integrating with Azure AD via SAML IdP, it is now possible to leverage Microsoft Single Sign-On for multiple ISE Portals (for example Sponsor and Guest/BYOD Portals).
At the time of this writing, ISE cann...
With the enhancements in ISE 3.0 for integrating with Azure AD via SAML IdP, it is now possible to create a BYOD Flow to provide Wireless network access using an employee’s Azure AD credentials.
The table below shows the whole Cisco Security solutions + Splunk integrations add-ons. Kindly let me know if I have missed some add-ons or if there are any new updates. Thank you!
Hope this will be helpful for everyone who is looking for Splunk in...
A python based script to generate report if there are disabled rules under an Access Control Policy and an option to delete those rules in bulk.
Step 1 Download the script on PCStep 2 Make sure python3 is installed on PC and have reach...
A python based script to generate report if there are double logging on FMC ACP (logging at beginning and end), having rule action "Allow" or "Trust". (Option1 )
Also, the logging at the begging will be disabled if logging is detected for both beginning ...