Jump to content

Search the Community

Showing results for tags 'IPS'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • ANNOUNCEMENTS
    • ANNOUNCEMENTS
  • CERTIFICATION - - - - - NO REQUESTS IN THESE FORUMS - - - - -
    • CISCO SYSTEMS
    • COMPTIA
    • LINUX
    • MICROSOFT
    • ORACLE
    • PROJECT MANAGEMENT
    • SECURITY CERTIFICATIONS
    • SUN MICROSYSTEMS
    • WIRELESS
    • OTHER CERTIFICATIONS
  • CISCO TECHNICAL SECTION
    • CISCO LABS
    • GNS3
    • NETWORK INFRASTRUCTURE
    • SECURITY
    • WIRELESS
    • SERVICE PROVIDERS
    • COLLABORATION, VOICE AND VIDEO
    • DATA CENTER
    • SMALL BUSINESS
  • MICROSOFT TECHNICAL SECTION
  • OTHER TECHNICAL SECTION
  • TRAINING OFFERS & REQUESTS
  • CERTCOLLECTION MALL
  • GENERAL FORUMS
  • COMMUNITY CENTER

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 25 results

  1. Hello , please need your support to make a plan for tunning the polcies for Cisco IPS , I don't know where to begin , any ideas , and if there is any ready made plans , could you please share it .
  2. Hi, I got my hands on a IPS AIP SSC-5. unfortunately for me the license has expired. Is there any way to update the signatures without a valid license? Thanks..
  3. IOS IPS Signature Update Package in 5.x format for CLI users IOS-S906-CLI.pkg Can anyone help?
  4. I have a Cisco NME-IPS installed in my 3825 router. I've been able to get the IPS to function correctly 'inline' on the external interface, but when I add the internal interfaces Network traffic flows for a little while but after that it stops. Any Ideas, as I'd like to have it providing IPS on the external interface and my VPN tunnel. Thank You
  5. Hello community, Great forum with great people.glad to be a part of it.I just purchased one Cisco ASA 5520 with AIP-40 module and the sensor came with 6.0(6)E4 Image.this AIP-SSM40 module is ugpradable to the latest my firewall is not having any service contract associated.so if someone generous can bring time to post these files it would be a great help. IPS SSM_40 Recovery Image File IPS-SSM_40-K9-r-1.1-a-7.1-11-E4.pkg Link:[Hidden Content]E4&relind=AVAILABLE&rellifecycle=&reltype=latest IPS SSM_40 Service Pack Upgrade IPS-SSM_40-K9-7.1-11-E4.pkg Link:[Hidden Content]E4&relind=AVAILABLE&rellifecycle=&reltype=latest IPS-SSM_40 System Image File IPS-SSM_40-K9-sys-1.1-a-7.1-11-E4.img Link:[Hidden Content]E4&relind=AVAILABLE&rellifecycle=&reltype=latest I am upgrading the Cisco ASA5520 to asa916-10-k8.bin and after getting AIP-SSM40 image.I will upgrade it.the most required file is the first one- IPS SSM_40 Recovery Image File.thanks a lot.
  6. Hi All, I have a question. We can copy the " realm-cisco.pub-key.txt " in the router via TFTP but can we Open it to copy the contents of the file. directly from the Router for the Cisco IOS IPS feature ? I know it can be directly opened from Test PC via text editor. But is it possible via CLI ? Can anyone please show me how ?
  7. Guys, I was trying to build one Security GNS3 topology..Topology is loading and i am getting 2 Qemu screens.. but after that Qemu is getting closed. PLease check my GNS3 configuration and give me some solutions. My Lap is i3 with 2 GB RAM. autostart = False version = 0.8.2-BETA [qemu 127.0.0.1:10525] workingdir = work udp = 20000 [[5520]] ram = 256 netcard = e1000 options = -hdachs 980,16,32 initrd = asa802-k8.initrd.gz kernel = asa802-k8.kernel kernel_cmdline = auto console=ttyS0,9600 bigphysarea=16384 ide1=noprobe [[iDS-4215]] image1 = disk1 image2 = disk2 nics = 3 ram = 1024 netcard = e1000 options = -smbios type=1,product=IDS-4235 [[ASA ASA2]] e0 = SW2 f1/10 e1 = SW1 f1/9 e2 = SW2 f1/11 x = -79.0 y = 254.0 z = 1.0 hx = 9.0 hy = 19.0 [[ASA ASA1]] e0 = SW2 f1/8 e1 = SW1 f1/8 e2 = SW2 f1/9 x = -78.0 y = 193.0 z = 1.0 hx = 11.0 hy = 16.0 [[iDS IDS1]] e0 = SW1 f1/7 e1 = SW2 f1/7 x = -69.3406204335 y = 133.477705423 z = 1.0 hx = 3.67157287526 hy = 14.5979797464 [127.0.0.1:7200] workingdir = work udp = 10000 [[3745]] image = C:\GNS3\Image\c3745-adventerprisek9-mz.124-25d.bin idlepc = 0x6148b534 sparsemem = True ghostios = True [[ROUTER R4]] model = 3745 console = 2003 aux = 2100 wic0/0 = WIC-2T f0/0 = SW1 f1/4 f0/1 = SW2 f1/4 slot1 = NM-4T s1/0 = FR2 4 x = -83.0 y = -101.0 z = 1.0 hx = 18.5 hy = 18.0 [[ROUTER R2]] model = 3745 console = 2022 aux = 2102 wic0/0 = WIC-2T f0/0 = SW1 f1/2 f0/1 = SW2 f1/2 slot1 = NM-4T s1/0 = FR2 2 x = -81.0832611207 y = -236.960461481 z = 1.0 hx = 19.0857864376 hy = 20.2548339959 [[ROUTER R3]] model = 3745 console = 2023 aux = 2103 wic0/0 = WIC-2T f0/0 = SW1 f1/3 f0/1 = SW2 f1/3 slot1 = NM-4T s1/0 = FR2 3 s1/1 = FR2 13 x = -78.2548339959 y = -166.249783362 z = 1.0 hx = 19.0857864376 hy = 20.2548339959 [[ROUTER R1]] model = 3745 console = 2021 aux = 2101 wic0/0 = WIC-2T f0/0 = SW1 f1/1 f0/1 = SW2 f1/1 slot1 = NM-4T s1/0 = FR2 1 x = -79.6690475583 y = -310.499566724 z = 1.0 hx = 17.6715728753 hy = 18.8406204335 [127.0.0.1:7201] workingdir = C:\GNS3\Work udp = 10100 [[3745]] image = C:\GNS3\Image\c3745-adventerprisek9-mz.124-25d.bin idlepc = 0x6148b534 sparsemem = True ghostios = True [[ROUTER R5]] model = 3745 console = 2011 aux = 2104 wic0/0 = WIC-2T f0/0 = SW1 f1/5 f0/1 = SW2 f1/5 slot1 = NM-4T s1/0 = FR2 5 x = -81.0 y = 19.0 z = 1.0 hx = 19.5 hy = 19.0 [[ROUTER R6]] model = 3745 console = 2012 aux = 2105 wic0/0 = WIC-2T f0/0 = SW1 f1/6 f0/1 = SW2 f1/6 slot1 = NM-4T s1/0 = FR2 6 x = -65.8578643763 y = 76.8284271247 z = 1.0 hx = 20.5 hy = 21.8284271247 [[FRSW FR2]] 1:102 = 2:201 1:103 = 3:301 1:104 = 4:401 1:105 = 5:501 1:113 = 13:311 2:201 = 1:102 2:203 = 3:302 2:204 = 4:402 2:205 = 5:502 2:213 = 13:312 3:301 = 1:103 3:302 = 2:203 3:304 = 4:403 3:305 = 5:503 4:401 = 1:104 4:402 = 2:204 4:403 = 3:304 4:405 = 5:504 4:413 = 13:314 5:501 = 1:105 5:502 = 2:205 5:503 = 3:305 5:504 = 4:405 5:513 = 13:315 6:51 = 21:51 6:100 = 21:100 6:101 = 21:101 6:201 = 21:201 6:301 = 21:301 6:401 = 21:401 13:311 = 1:113 13:312 = 2:213 13:314 = 4:413 13:315 = 5:513 21:51 = 6:51 21:100 = 6:100 21:101 = 6:101 21:201 = 6:201 21:301 = 6:301 21:401 = 6:401 1 = R1 s1/0 2 = R2 s1/0 3 = R3 s1/0 4 = R4 s1/0 5 = R5 s1/0 6 = R6 s1/0 13 = R3 s1/1 21 = BB1 s1/1 x = 174.403679018 y = -297.205627484 z = 1.0 [[ROUTER SW1]] model = 3745 console = 2008 aux = 2106 wic0/0 = WIC-2T slot1 = NM-16ESW f1/0 = nio_gen_eth:\Device\NPF_{6592AF0E-4A79-4077-8AF2-A2680D4A7E2C} f1/1 = R1 f0/0 f1/2 = R2 f0/0 f1/3 = R3 f0/0 f1/4 = R4 f0/0 f1/5 = R5 f0/0 f1/6 = R6 f0/0 f1/7 = IDS1 e0 f1/8 = ASA1 e1 f1/9 = ASA2 e1 f1/12 = BB2 f0/0 f1/13 = SW2 f1/13 f1/14 = SW2 f1/14 f1/15 = SW2 f1/15 symbol = multilayer_switch x = -350.5 y = -41.5 z = 1.0 hx = 7.41421356237 hy = 14.5441558773 [[ROUTER SW2]] model = 3745 console = 2009 aux = 2107 wic0/0 = WIC-2T slot1 = NM-16ESW f1/1 = R1 f0/1 f1/2 = R2 f0/1 f1/3 = R3 f0/1 f1/4 = R4 f0/1 f1/5 = R5 f0/1 f1/6 = R6 f0/1 f1/7 = IDS1 e1 f1/8 = ASA1 e0 f1/9 = ASA1 e2 f1/10 = ASA2 e0 f1/11 = ASA2 e2 f1/12 = BB3 f0/0 f1/13 = SW1 f1/13 f1/14 = SW1 f1/14 f1/15 = SW1 f1/15 symbol = multilayer_switch x = 208.5 y = -40.5 z = 1.0 hx = 2.34314575051 hy = 15.5441558773 [127.0.0.1:7204] workingdir = C:\GNS3\Work udp = 10400 [[7200]] image = C:\GNS3\Image\c7200-adventerprisek9-mz.124-24.T5.extracted.bin.BIN ghostios = True [[ROUTER BB3]] console = 2015 aux = 2108 slot0 = C7200-IO-FE f0/0 = SW2 f1/12 slot1 = PA-8T s1/0 = BB1 s1/0 x = 337.931890781 y = -135.209019353 z = 1.0 [[ROUTER BB2]] console = 2013 aux = 2109 slot0 = C7200-IO-FE f0/0 = SW1 f1/12 slot1 = PA-4T+ x = -355.902812468 y = -154.539971795 z = 1.0 [127.0.0.1:7203] workingdir = C:\GNS3\Work udp = 10300 [[7200]] image = C:\GNS3\Image\c7200-adventerprisek9-mz.124-24.T5.extracted.bin.BIN ghostios = True [[ROUTER BB1]] console = 2011 aux = 2110 slot0 = C7200-IO-2FE slot1 = PA-8T s1/0 = BB3 s1/0 s1/1 = FR2 21 x = 291.720779388 y = -245.909596204 z = 1.0 [GNS3-DATA] m11 = 0.707106781187 m22 = 0.707106781187 [[NOTE 1]] text = [[ROUTER SW2]]\n model = 3725\n console = 2009\n wic0/0 = WIC-2T\n f1/0 = Lo2\n slot1 = NM-16ESW\n f1/1 = R1 f0/1\n f1/2 = R2 f0/1\n f1/3 = R3 f0/1\n f1/4 = R4 f0/1\n f1/5 = R5 f0/1\n f1/6 = R6 f0/1\n f1/7 = IDS3 e1\n f1/8 = ASA1 e0\n f1/9 = ASA1 e2\n f1/10 = ASA2 e0\n f1/11 = ASA2 e2\n f1/12 = BB3\n f1/13 = SW1 f1/13\n f1/14 = SW1 f1/14\n f1/15 = SW1 f1/15 x = 337.997041407 y = -65.7401153702 z = 2.0 [[NOTE 2]] text = [[ROUTER SW1]]\n model = 3725\n console = 2008\n wic0/0 = WIC-2T\n slot1 = NM-16ESW\n f1/0 = Lo1\n f1/1 = R1 f0/0\n f1/2 = R2 f0/0\n f1/3 = R3 f0/0\n f1/4 = R4 f0/0\n f1/5 = R5 f0/0\n f1/6 = R6 f0/0\n f1/7 = IDS3 e0\n f1/8 = ASA1 e1\n f1/9 = ASA2 e1\n f1/10 = Lo3 (vlan 23)\n f1/12 = BB2\n f1/13 = SW2 f1/13\n f1/14 = SW2 f1/14\n f1/15 = SW2 f1/15 x = -528.915872327 y = -47.3553390593 z = 2.0 [[NOTE 3]] text = [[FRSW FR1]]\n 1:102 = 10:201\n 1:103 = 11:301\n 1:104 = 13:401\n 1:105 = 14:501\n 10:201 = 1:102\n 11:301 = 1:103\n 13:401 = 1:104\n 14:501 = 1:105\n 1 = R1 s0/0\n 10 = R2 s0/0\n 11 = R3 s0/0\n 13 = R4 s0/0\n 14 = R5 s0/0 x = -511.945309579 y = -292.01428535 z = 2.0 [[Cloud C3]] symbol = computer x = -357.769119346 y = 114.749783363 hx = 16.2573593129 hy = 7.52691193456 z = 1.0 connections = SW1:f1/0:nio_gen_eth:\Device\NPF_{6592AF0E-4A79-4077-8AF2-A2680D4A7E2C} [[Cloud C4]] symbol = computer x = 202.259451354 y = 191.11731573 z = 1.0
  8. Dear All, Is there any wayy to emulate Cisco IPS 7.x in VWWARE? Thanks
  9. Hi guys, Can someone upload an IPS v.7.0 software? Best regards.
  10. Hi all, this scenario is for my knowledge purpose only Lab setup: R1------IPS------R2------R3 I need to create a custom signature to deny telnet as given below Telnet from R1 to R2 should be allowed but from telnet session of R2 if I telnet to R3 it should be blocked by IPS. please advice how to create custom signature for the above scenario. Thanks in advance for your inputs Regards Joe
  11. Dear All, For new lab please help me confirm the below things, 1. In IPS, what is the direction of the configure signature a. To-service b.From-Service 2. In ASA section ZBF is the below correct and final or the final arrangement is different interface FastEthernet0/0.1 zone-member security internal interface FastEthernet0/0.2 zone-member security internal interface FastEthernet0/1 zone-member security external 3. Is the NAT question same as old lab or it is different ? 4. What about the backup interface should it be the part of OSPF or not ? Mentioning that I have finalized these solutions from my behalf and willing to share the whole configuration what so ever with any body. Also I have verified solution for the very old lab which was not coming and which the new lab is predecessor off. Thanks
  12. Hello there, Anyone got these files.I am looking for them to update my ASA5510 with AIP-SSM20 module.thanks in advanced for the precious time you giving to look for providing files. E4 Signature Update S901 IPS-sig-S901-req-E4.pkg [Hidden Content] IPS SSM_20 Recovery Image File IPS-SSM_20-K9-r-1.1-a-7.1-11-E4.pkg [Hidden Content]E4&relind=AVAILABLE&rellifecycle=&reltype=latest IPS-SSM_20 System Image File IPS-SSM_20-K9-sys-1.1-a-7.1-11-E4.img [Hidden Content]E4&relind=AVAILABLE&rellifecycle=&reltype=latest IPS SSM_20 Service Pack Upgrade IPS-SSM_20-K9-7.1-11-E4.pkg [Hidden Content]E4&relind=AVAILABLE&rellifecycle=&reltype=latest
  13. Talk about timing! I just got a free IDS-4215 delivered today, and Cisco were kind enough to update their IME software just yesterday! Would someone else be even kinder and upload it for me please? IPS Manager Express 7.2.4.50 IME-7_2_4_50.exe Thanks!
  14. Hi out there Can anyone kindly offer (automatic updates are disabled at the moment...): Cisco IOS Intrusion Prevention System Signatures for Cisco Configuration Professional sigv5-SDM-S756.zip or/and Cisco IOS Intrusion Prevention System Feature Software IOS-S759-CLI.pkg Kind regards
  15. IMEdemo is not launching but IME works OK. After initial install it worked but I had to drop ZoneAlarm firewall momentarily. Now it won't launch. Steps taken: reinstalled after cleaning with Ccleaner cleaned out ZoneAlarm application rules captures with Wireshark - no packets ZoneAlarm firewall logs - no clues tried 7.1.1 same outcome aware that 7.2.4.50 was revised without new revision number. File obtained from these forums and ran once. MD5 not checked. Need it to cram for 642-627 All suggestions welcome.
  16. I recently purchased a Cisco ASA 5550 which came with the Cisco ASA-SSM-40 which is the AIP Security Service Module I would like to upgrade this to the latest version which is as follows: Intrusion Prevention System (IPS) Recovery Software - 7.1(7)E4 IPS SSM_40 Recovery Image File IPS-SSM_40-K9-r-1.1-a-7.1-7-E4.pkg 25-FEB-2013 37.37 MB [Hidden Content] Intrusion Prevention System (IPS) Signature Updates - S947 E4 Signature Update S947 IPS-sig-S947-req-E4.pkg 11-OCT-2016 1.54 MB [Hidden Content] Intrusion Prevention System (IPS) System Software - 7.1(7)E4 IPS-SSM_40 System Image File IPS-SSM_40-K9-sys-1.1-a-7.1-7-E4.img 25-FEB-2013 37.32 MB [Hidden Content] Intrusion Prevention System (IPS) System Upgrades - 7.1(7)E4 IPS SSM_40 Service Pack Upgrade IPS-SSM_40-K9-7.1-7-E4.pkg 25-FEB-2013 39.14 MB [Hidden Content]
  17. Hi, I got my hands on a CiSCO IPS AIP SSC-5. unfortunately for me the license has expired. Is there any way to update the signatures without a valid license? Thanks..
  18. Publisher: Cisco Press; 3 edition (May 10, 2014) Language: English ISBN-10: 1587143070 ISBN-13: 978-1587143076 All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Identify, mitigate, and respond to today’s highly-sophisticated network attacks. Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services has been fully updated to cover the newest techniques and Cisco technologies for maximizing end-to-end security in your environment. Three leading Cisco security experts guide you through every step of creating a complete security plan with Cisco ASA, and then deploying, configuring, operating, and troubleshooting your solution. Fully updated for today’s newest ASA releases, this edition adds new coverage of ASA 5500-X, ASA 5585-X, ASA Services Module, ASA next-generation firewall services, EtherChannel, Global ACLs, clustering, IPv6 improvements, IKEv2, AnyConnect Secure Mobility VPN clients, and more. The authors explain significant recent licensing changes; introduce enhancements to ASA IPS; and walk you through configuring IPsec, SSL VPN, and NAT/PAT. You’ll learn how to apply Cisco ASA adaptive identification and mitigation services to systematically strengthen security in network environments of all sizes and types. The authors present up-to-date sample configurations, proven design scenarios, and actual debugs– all designed to help you make the most of Cisco ASA in your rapidly evolving network. Jazib Frahim, CCIE® No. 5459 (Routing and Switching; Security), Principal Engineer in the Global Security Solutions team, guides top-tier Cisco customers in security-focused network design and implementation. He architects, develops, and launches new security services concepts. His books include Cisco SSL VPN Solutions and Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting. Omar Santos, CISSP No. 463598, Cisco Product Security Incident Response Team (PSIRT) technical leader, leads and mentors engineers and incident managers in investigating and resolving vulnerabilities in Cisco products and protecting Cisco customers. Through 18 years in IT and cybersecurity, he has designed, implemented, and supported numerous secure networks for Fortune® 500 companies and the U.S. government. He is also the author of several other books and numerous whitepapers and articles. Andrew Ossipov, CCIE® No. 18483 and CISSP No. 344324, is a Cisco Technical Marketing Engineer focused on firewalls, intrusion prevention, and data center security. Drawing on more than 16 years in networking, he works to solve complex customer technical problems, architect new features and products, and define future directions for Cisco’s product portfolio. He holds several pending patents. Understand, install, configure, license, maintain, and troubleshoot the newest ASA devices Efficiently implement Authentication, Authorization, and Accounting (AAA) services Control and provision network access with packet filtering, context-aware Cisco ASA next-generation firewall services, and new NAT/PAT concepts Configure IP routing, application inspection, and QoS Create firewall contexts with unique configurations, interfaces, policies, routing tables, and administration Enable integrated protection against many types of malware and advanced persistent threats (APTs) via Cisco Cloud Web Security and Cisco Security Intelligence Operations (SIO) Implement high availability with failover and elastic scalability with clustering Deploy, troubleshoot, monitor, tune, and manage Intrusion Prevention System (IPS) features Implement site-to-site IPsec VPNs and all forms of remote-access VPNs (IPsec, clientless SSL, and client-based SSL) Configure and troubleshoot Public Key Infrastructure (PKI) Use IKEv2 to more effectively resist attacks against VPNs Leverage IPv6 support for IPS, packet inspection, transparent firewalls, and site-to-site IPsec VPNs Fast Resume Single Link [Hidden Content]
  19. Back again... I have lost my touch with google. Can someone please share "IPS-engine-E4-req-7.0-2.pkg"? TIA!
  20. Hello there, Kindly someone post these latest IOS files from their precious time. Release 9.1.7 Interim [Hidden Content] Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release. asa917-4-k8.bin ASA Advanced Inspection and Prevention (AIP) Security Services Module Release S909 [Hidden Content] E4 Signature Update S909 IPS-sig-S909-req-E4.pkg IOS Intrusion Prevention System Feature Software Release S902 [Hidden Content] IOS IPS Signature Update Package in 5.x format for CLI users IOS-S902-CLI.pkg (funny thing-the publication date of this release is 06-dec-2016) thank you.
  21. [hide][Hidden Content]] IME-7_2_3.exe [hide][Hidden Content]] IPS-SSC_5-K9-6.2-4-E4.pkg [hide][Hidden Content]] IPS-SSC_5-K9-sys-1.1-a-6.2-4-E4.img [hide][Hidden Content]] IPS-SSC_5-K9-r-1.1-a-6.2-4-E4.pkg [hide][Hidden Content]] IPS-sig-S698-req-E4.pkg
  22. Hi, almost done with my CCNP, and my homelab, but as I start digging into security and finding cheap hardware to complete my complex setup I'm in need to upgrade my IDS 4215, which is running version 4.0 From what I can understand I need the .pkg upgrade file to version 5.0, then I can apply the 5-6 img updates which are not recognized in 4.x Could someone share the 5.x pkg upgrade that will work under 4.x with me? Thank you very much I don't have money to afford the newer stuff and those old .pkg are tough to find. The 6.x are still easier to find... I need: -IPS-K9-maj-5.0-1e-S149.rpm.pkg -IDS-4215-bios-5.1.7-rom-1.4.bin (not sure) -IPS-K9-6.0-6-E4.pkg or -IPS-K9-6.0-6-E3.pkg or -IPS-4215-K9-sys-1.1-a-6.0-6-E4.img or -IPS-4215-K9-sys-1.1-a-6.0-6-E3.img Again, thank you
  23. I see this message on every page as well as every time when i open the CC in the browser. Clicking the link takes me to the appstore, which cannot find such app. Any thoughts?
  24. i experienced the IPS IDM login error with Java run-time environment. the error log state " increase the java heap size more than 256m", but in the Java option, i do increase to 768m. but the same error log with only 256m. kindly help on the issue. best regard,
  25. Hi there, Does anybody have below CiscoIOS IPS Signature Files + appropriate Public Key(realm-cisco.pub.key.txt); Description: Cisco IOS Intrusion Prevention System Signatures for Cisco Configuration Professional Release Date: 18/May/2012 File Name: sigv5-SDM-S647.zip Size: 2.56 MB (2683558 bytes) MD5 Checksum: 58a0a7fc6d9327cf3ff27ac0cfc8d8a3 URL: [Hidden Content] Description: IOS IPS Signature Update Package in 5.x format for CLI users Release Date: 28/Mar/2012 File Name: IOS-S636-CLI.pkg Size: 14.01 MB (14685484 bytes) MD5 Checksum: e369e35ff2ec84b6048fc1b1d5b540e9 URL: [Hidden Content] Greatly appreciate any kind of help. Looking forward ... CLOSED TOPIC Topic closed, Request fulfilled. Thanks and regards
×
×
  • Create New...