Omada IDS/IPS
Hello,
I am looking for any information on what the source is for IDS/IPS rule sets, and how frequently the rule sets are downloaded to the IDS/IPS capable routers. It appears that they are Suricata rules, can we load our own rule sets, or can we point it to something such as the Proofpoint Emerging Threats Rules.
- Copy Link
- Subscribe
- Bookmark
- Report Inappropriate Content
As for the frequency of downloading the rule sets to the IDS/IPS capable routers, TP-Link typically releases updates periodically to ensure that the routers can effectively detect and prevent the latest threats. However, the specific update frequency may vary depending on different product models and security situations. Generally, users can check for updates through the router's management interface or the official TP-Link support website.
Regarding loading your own rule sets or pointing the router to other rule sources such as the Proofpoint Emerging Threats Rules, TP-Link routers are designed to use the rule sets provided by TP-Link. Loading third-party rule sets or pointing to external rule sources may not be supported to ensure the stability, compatibility, and security of the router. It is recommended that users use the official rule sets provided by TP-Link for the best security protection.
- Copy Link
- Report Inappropriate Content
As for the frequency of downloading the rule sets to the IDS/IPS capable routers, TP-Link typically releases updates periodically to ensure that the routers can effectively detect and prevent the latest threats. However, the specific update frequency may vary depending on different product models and security situations. Generally, users can check for updates through the router's management interface or the official TP-Link support website.
Regarding loading your own rule sets or pointing the router to other rule sources such as the Proofpoint Emerging Threats Rules, TP-Link routers are designed to use the rule sets provided by TP-Link. Loading third-party rule sets or pointing to external rule sources may not be supported to ensure the stability, compatibility, and security of the router. It is recommended that users use the official rule sets provided by TP-Link for the best security protection.
- Copy Link
- Report Inappropriate Content
Hello @Vincent-TP,
Thank you for the response. Does TP-Link have a white paper, or any other details about the methodology, processes etc. that they are using to generate the rules?
- Copy Link
- Report Inappropriate Content
- Copy Link
- Report Inappropriate Content
Information
Helpful: 1
Views: 459
Replies: 3
Voters 0
No one has voted for it yet.