ZyXEL Communications Vantage CNM 2.3 User Manual page 180

Centralized network management
Hide thumbs Also See for Vantage CNM 2.3:
Table of Contents

Advertisement

Chapter 6 Device Security Settings
Operation > Configuration Management > Signature Profile Management
> Reset to Factory or Backup & Restore screen.
Figure 72 Device Operation > Device Configuration > Security > IDP > Signature
The following table describes the labels in this screen.
Table 65 Device Operation > Device Configuration > Security > IDP > Signature
LABEL
Switch to
query view
Attack Type
Name
ID
Severity
Platform
180
DESCRIPTION
Click this hyperlink to go to a screen where you can search for signatures
based on criteria other than attack type.
Select the type of signatures you want to view from the list box. See
Section 6.9.1 on page 176
The table displays the signatures of the type that you selected. Click a
column's header to sort the entries by that attribute.
The (read-only) signature name identifies a specific signature targeted at a
specific intrusion. Click the hyperlink for more detailed information on the
intrusion.
Each intrusion has a unique identification number. This number may be
searched at myZyXEL.com for more detailed information.
This field displays the level of threat that the intrusion may pose. See
63 on page 178
for more information on intrusion severity.
This field displays the computer or network device operating system that
the intrusion targets or is vulnerable to the intrusion. These icons represent
a Windows operating system, a UNIX-based operating system and a
network device, respectively.
for information on types of signatures.
Vantage CNM User's Guide
Table

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage cnm

Table of Contents