Tailoring Intrusion Protection to Your Network Assets

The following topics describe how to use Cisco recommended rules: