How does it work? Does it typically have predefined patterns of trusted or malicious activity? Is it actually a category of firewall techniques? I am more curious about Cisco than I am about other products..
Asked
Active
Viewed 750 times
1 Answers
2
Cisco IPS basically uses "signatures" which are nothing more than regular expressions.
GregD
- 8,713
- 1
- 23
- 35
-
Of course. I'm not always crotchety.. – GregD Jan 05 '11 at 18:16