Introduction to radware-vdp.8.22.2.0-1.SPA.csp Software
The radware-vdp.8.22.2.0-1.SPA.csp is a specialized software package for Cisco Firepower 4100 and 9300 Series appliances, integrating Radware’s virtual DefensePro (vDP) 8.22.2.0-1 to deliver advanced DDoS protection and traffic mitigation. This release, validated for Cisco’s Secure Firewall ecosystem, enables automated threat detection and response while maintaining compliance with enterprise security policies.
Designed for hybrid cloud environments, this software bundle supports:
- Real-time traffic analysis and attack pattern recognition
- Seamless integration with Cisco Firepower Threat Defense (FTD) and Adaptive Security Appliance (ASA) software
- Scalable deployment across multi-tenant architectures
Key Features and Improvements
1. Enhanced DDoS Mitigation Capacity
- Increased maximum mitigation throughput to 30 Gbps for Firepower 9300 with three security modules.
- Supports up to 5.4 million packets per second (PPS) attack prevention rates in high-density configurations.
2. Dynamic Core Allocation
- Flexible vCPU core assignment (2–10 cores) to balance DDoS mitigation and application performance.
- Optimizes resource utilization without requiring hardware upgrades.
3. Unified Threat Visibility
- Centralized logging integration with Cisco Secure Firewall Management Center.
- Real-time dashboards for attack severity classification and traffic source tracing.
Compatibility and Requirements
Supported Hardware Platforms
Cisco Firepower Model | Minimum Supported FXOS Version |
---|---|
4112 | 2.3(1) |
4115 | 2.4(1) |
4125 | 2.6(1) |
4145 | 2.6(1) |
9300 (All Security Modules) | 2.10(1) |
Software Dependencies
- Requires Cisco ASA/FTD version 9.16(x) or later.
- Compatible with Cisco Firepower Chassis Manager 2.10.1+ for GUI-based provisioning.
Secure Software Access
Licensed users can obtain radware-vdp.8.22.2.0-1.SPA.csp through Cisco’s Software Center or authorized distributors like iOSHub. Enterprise customers must validate active Threat Defense or Secure Firewall licenses before deployment.
Verification and Support
- Integrity Checks: Compare the SHA-512 hash with Cisco’s published value (available in the release notes).
- Documentation: Review the Radware vDP Configuration Guide for deployment best practices.
- Technical Assistance: Contact Cisco TAC for compatibility audits or troubleshooting.
This article consolidates technical specifications from Cisco’s validated design guides and Radware’s threat prevention frameworks. Always test configurations in non-production environments before full-scale implementation.