If ever wondered where i may find latest information about Firepower
Application Detectors now you have it all in our updated documentation:
When using the’ Variable Sets’ it important to understand how SNORT
rules works. Cisco Firepower is using SNORT, and got a huge amount of
SNORT rules in its database. SNORT is in general a heavy process in
Firepower Threat Defense, so if we can free some ...
In Cisco IPS Signatures 101 (Sept ’12 Chalk Talk) signature properties,
engines, alerts, and actions were covered from a high level. The purpose
of this document is to help a network or security professional
understand how to configure Cisco Signatures to...
The task of deploying a network IPS (Intrusion Prevention System) device
can be quite overwhelming for a network or security professional that
hasn’t done it before. Before tackling such a task, it is very important
to understand Cisco Signatures. The pur...
IOS IPS customers running version 12.4T, 15.0M, or 15.1M - a critical
software defect has been identified which may cause your router to
reload and be stuck in a boot loop if IOS IPS signature version S639 or
later is installed on the device. Recovery of ...
Walter Sulym | January 13, 2012 at 5:14 pm PST Cisco Blog > SecurityThe
threat landscape is an ever evolving environment that must be addressed
with constant iteration. Since the Cisco Intrusion Prevention System
signature configuration has grown over the...
Dave Burns and Odunayo Adesina discuss deciding how and where to use the
Cisco IPS, how to get it initialized/inline, and how to manage it
quickly.The task of deploying a network IPS (Intrusion Prevention
System) device can be quite overwhelming for a net...
IntroductionYou may find it necessary to apply separate inspection
policies to different traffic flows. Applying separate firewall protocol
inspections on a per flow basis is done simply by appropriately
configuring the Modular Policy Framework (MPF) on t...
OverviewIntroduction - What are Regular Expressions and why should I
read this ?Regex Basic FunctionsReading Regular ExpressionsRegex for IPS
SignaturesConclusion and linksWhat are Regular Expressions and why
should I read this ?Regular Expressions (or sh...
I have an ISP in Australia that requires VLAN 100 to connect to the Internet. This is pure data. It is Australia's NBN system. They have handed us a .252 Public IP to use on our Firewall with a default route to the upstream router they are using for...
Threat Response Basics
What is Threat Response and how can it help my organization?
What is the cost of Threat Response?
What are the deployment options for Threat Response?
Is Threat Response available outside of the United States?
If you are just starting with Threat Response for the first time, use our quick start guides for Umbrella, Email Security, or Firepower. You can also check out our module configuration videos on YouTube and the in-product configuration details.