Custom Signature Example - ZyXEL Communications NXC5200 User Manual

Hide thumbs Also See for NXC5200:
Table of Contents

Advertisement

Table 121 Configuration > Anti-X > IDP > Custom Signatures > Add/Edit (continued)
LABEL
OK
Cancel

21.7.2 Custom Signature Example

Before creating a custom signature, you must first clearly understand the
vulnerability.
21.7.2.1 Understand the Vulnerability
Check the NXC logs when the attack occurs. Use web sites such as Google or
Security Focus to get as much information about the attack as you can. The more
specific your signature, the less chance it will cause false positives.
As an example, say you want to check if your router is being overloaded with DNS
queries so you create a signature to detect DNS query traffic.
NXC5200 User's Guide
DESCRIPTION
Click this button to save your changes to the NXC and return to the
summary screen.
Click this button to return to the summary screen without saving any
changes.
Chapter 21 IDP
329

Advertisement

Table of Contents
loading

This manual is also suitable for:

Nxc5200 - v2.20

Table of Contents