Verifying Custom Signatures - ZyXEL Communications NXC5200 User Manual

Hide thumbs Also See for NXC5200:
Table of Contents

Advertisement

Chapter 21 IDP
You can activate the signature, configure what action to take when a packet
matches it and if it should generate a log or alert in a profile. Then bind the profile
to a zone.
Figure 148 Example: Custom Signature in IDP Profile

21.7.4 Verifying Custom Signatures

Configure the signature to create a log when traffic matches the signature. (You
may also want to configure an alert if it is for a serious attack and needs
immediate attention.) After you apply the signature to a zone, you can see if it
works by checking the logs (Monitor > Log).
The Priority column shows warn for signatures that are configured to generate a
log only. It shows critical for signatures that are configured to generate a log and
alert. All IDP signatures come under the IDP category. The Note column displays
ACCESS FORWARD when no action is configured for the signature. It displays
ACCESS DENIED if you configure the signature action to drop the packet.
332
NXC5200 User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Nxc5200 - v2.20

Table of Contents