How a 5 Gbps throughput IPS can support 2*10Gbps interfaces?
Answer Question | November 9, 2012 7:42 AM
What is the best free syslog tool? We used to use kiwi but it is no longer free. We need to simply monitor a syslog, write it to disk and resolve IPs in it to host names.
Answer Question | May 18, 2011 6:48 PM
IPS, Kiwi Syslog, Kiwi Syslog Server, Syslog, System monitoring
[strong]We are into firewall services, We had our own firewall Hardware & Services. Our Firewall is new in the market & IDS & IPS feture is not available in the firewall. I would like to know from were to get IDS & IPS Signature & certificate so that our firewall will be complete firewall.[/strong]
Answer Question | November 16, 2010 11:09 AM
Firewalls, IDS, IPS, Linux, Linux firewalls
Can we address specific IPS from our hp pro curve 4000m or only by port numbers? If only by port can we set a VLAN for a specific machine to always be in it and apply priority rules to the VLAN?
Answer Question | February 14, 2011 2:38 PM
HP ProCurve, IPS, Port numbers, VLAN, VLAN management, VLAN Setup
I have Symantec Endpoint Protection ver 11 installed, with ips and ids. How could I know if it is working or not? I tried to run a couple of tools, gfi languard ver 9.5 evalution version, zenmap, but they did not prodice any entries in IPS logs.. Any help is appreciated…
Answer Question | October 1, 2010 3:52 PM
IDS, Intrusion prevention systems, IPS, Security, Security in 2010, Symantec Endpoint Protection, Symantec Endpoint Protection 11
After logging in IPS module sensor getting error.”Error connecting to sensor.Failed to creat sensor – 172.16.24.18:443″ & 172.16.24.18 is my sensor ip. ASA version : Version 7.2(4) IPS version : 6.2(1)E3 IF possible kindly give me the answer.
Answer Question | September 4, 2009 5:11 AM
Cisco ASA, Cisco ASA 5520, Cisco IPS, IPS, IPS Error
Hi. I have a scenario where an IPS is connected to the switch and is monitoring all the ports of it. I would like to know that whether this device can capture information till layer 3 (network layer) or it can capture full details of all seven layers, like which application, protocol and port is [...]
Answer Question | July 29, 2009 6:49 PM
Intrusion detection, Intrusion prevention systems, IPS
Does host intrusion detection systems use heuristic based detection, which in turn uses a cipher key to determine if an alert should be triggered?
Answer Question | May 17, 2013 11:43 AM
DOD, HIDS, HIPS, Host intrusion detection, IDS, Intrusion detection, Intrusion prevention, IPS