Using Access Control rules, application traffic can be trusted, blocked or allowed but passed on for deep packet analysis and threat inspection.Īpplications can be identified whether or not they are operating on standard network ports. One of the primary means for controlling applications is with rules in the Access Control policy. The system can then detect unusual or malicious activity diverging from normal traffic patterns by creating a traffic baseline. This allows tailoring threat inspection policies based on vulnerabilities specific to a unique customer’s environment.Ĭustomers can create traffic profiles based on application usage. The Secure Firewall identifies operating systems and applications for internal network hosts based on passive traffic analysis. The system can even identify client applications in encrypted traffic based on proprietary fingerprinting technology without the need for CPU-intensive traffic decryption. In addition, specific file types can be allowed or blocked for various application protocols.Ĭustomers can target and exclude specific application traffic from SSL/TLS decryption. ![]() Application traffic can be allowed, blocked, or passed on for deep packet analysis by the system’s Snort inspection technology. ![]() To view the current list of application detectors, visit. ![]() The system currently identifies nearly 6,000 specific applications. The Cisco Secure Firewall Threat Defense (FTD) provides multiple means of controlling and providing visibility to network applications.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |