0

How does it work? Does it typically have predefined patterns of trusted or malicious activity? Is it actually a category of firewall techniques? I am more curious about Cisco than I am about other products..

GregD
  • 8,713
  • 1
  • 23
  • 35
700 Software
  • 2,163
  • 9
  • 47
  • 77

1 Answers1

2

Cisco IPS basically uses "signatures" which are nothing more than regular expressions.

GregD
  • 8,713
  • 1
  • 23
  • 35