You are correct by stating that CSPM does not allow you to configure alarm thresholds. You do have alternatives. If your sensor is at version 3.1 or greater, you can use IDM (Intrusion Detection Manager), which allows you to use a ssl connection into...
the iplog file is created based on specific signatures being configured with an action of "IP Log". The "log" file is all information captured by the loggerd daemon.
Make sure you are not confusing your terms. Primary and Secondary PIX will never change their designations. Primary and Secondary will, depending on if failover has occured or not.Bob
You must specify what IP address can connect to the PIX using PDM. If you have a PIX with an existing configuration, the configuration will be read into PDM.As far as PDM 2.0 software on CCO, it will be available next neek. It has been deferred until...