Using the Signature Database
Use the Signature Database page to download and install the intrusion prevention system (IPS) signature database and application firewall signature database to security devices. This database includes signature definitions of attacks and applications that can be used to identify applications for tracking firewall policies, quality of service prioritization, and IPS.
Before You Begin
Read the Understanding Signature Databases topic.
Ensure that your device has a connection to the Internet to download security package updates.
Review the signature database main page for an understanding of your current data set. See Signature Database Main Page Fields for field descriptions.
Downloading and Installing the Signature Database Configuration
If signature database is not downloaded, navigate to Administration > Signature Database to download the latest signatures.
- To download the signature database configuration, perform the steps provided in Downloading the Signature Database Configuration.
- To upload the signature database configuration, perform the steps provided in Uploading the Signature Database Configuration from a File System.
- To install the signature database configuration, perform the steps provided in Installing the Signature Database Configuration .
Once you download and install the signatures, you can use them to configure application services.