Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

Using the Signature Database

 

Use the Signature Database page to download and install the intrusion prevention system (IPS) signature database and application firewall signature database to security devices. This database includes signature definitions of attacks and applications that can be used to identify applications for tracking firewall policies, quality of service prioritization, and IPS.

Before You Begin

To download and install the signature database configuration:

If signature database is not downloaded, navigate to Administration > Signature Database to download the latest signatures.

  1. To download the signature database configuration, perform the steps provided in Downloading the Signature Database Configuration.
  2. To upload the signature database configuration, perform the steps provided in Uploading the Signature Database Configuration from a File System.
  3. To install the signature database configuration, perform the steps provided in Installing the Signature Database Configuration .

Once you download and install the signatures, you can use them to configure application services.