Special connection events, called Security Intelligence events, represent connections that were blocked by the reputation-based Security Intelligence feature.Ĭonnection events contain data about the detected sessions. Settings in rules and policies give you granular control over which connections you log, when you log them, and where you The system can generate logs of the connections its managed devices detect. Requirements and Prerequisites for Connection Logging.Log connections made by hosts on your monitored network: The following topics describe how to configure the Firepower System to An Overview of Intrusion Detection and PreventionĬontrol Settings for Network Analysis and Intrusion Policies.Inspection Performance and Storage Tuning Access Control Using Content Restriction.Blocking Traffic with Security Intelligence.HTTP Response Pages and Interactive Blocking.Translation (NAT) for Firepower Threat Defense Site-to-Site VPNs for Firepower Threat Defense.VPN Overview for Firepower Threat Defense.Clustering for the Firepower Threat Defense.High Availability for Firepower Threat Defense.Quality of Service (QoS) for Firepower Threat Defenseĭefense High Availability and Scalability.Inline Sets and Passive Interfaces for Firepower Threat Defense.Regular Firewall Interfaces for Firepower Threat Defense.Interface Overview for Firepower Threat Defense.Firepower Threat Defense Interfaces and Device Settings.FlexConfig Policies for Firepower Threat Defense.Logical Devices for the Firepower Threat Defense on the Firepower 4100/9300. Routed Firewall Mode for Firepower Threat Defense
0 Comments
Leave a Reply. |