How does it work? Does it typically have predefined patterns of trusted or malicious activity? Is it actually a category of firewall techniques? I am more curious about Cisco than I am about other products..
Asked
Active
Viewed 758 times
1 Answers
2
Cisco IPS basically uses "signatures" which are nothing more than regular expressions.

GregD
- 8,713
- 1
- 24
- 36
-
Of course. I'm not always crotchety.. – GregD Jan 05 '11 at 18:16