0

How does it work? Does it typically have predefined patterns of trusted or malicious activity? Is it actually a category of firewall techniques? I am more curious about Cisco than I am about other products..

GregD
  • 8,713
  • 1
  • 24
  • 36
700 Software
  • 2,233
  • 10
  • 49
  • 77

1 Answers1

2

Cisco IPS basically uses "signatures" which are nothing more than regular expressions.

GregD
  • 8,713
  • 1
  • 24
  • 36