ZyXEL Communications Vantage CNM 2.3 User Manual page 183

Centralized network management
Hide thumbs Also See for Vantage CNM 2.3:
Table of Contents

Advertisement

Table 66 Device Operation > Device Configuration > Security > IDP > Signature
(Query View) (continued)
LABEL
Type
Platform
Active
Log
Alert
Action
Search
Configure
Signatures
Name
ID
Severity
Type
Platform
Active
Vantage CNM User's Guide
DESCRIPTION
Search for signatures by attack type(s) (see
Attack types are known as policy types in the group view screen.
Search for signatures created to prevent intrusions targeting specific
operating system(s).
Search for enabled and/or disabled signatures here.
Search for signatures by log option here.
Search for signatures by alert option here.
Search for signatures by the response the device takes when a packet
matches a signature. See
Click this button to begin the search. The results display at the bottom
of the screen. Results may be spread over several pages depending on
how broad the search criteria selected were. The tighter the criteria
selected, the fewer the signatures returned.
The results display in a table showing the criteria as selected in the
search. Click a column's header to sort the entries by that attribute.
The (read-only) signature name identifies a specific signature targeted
at a specific intrusion. Click the hyperlink for more detailed information
on the intrusion.
Each intrusion has a unique identification number. This number may be
searched at myZyXEL.com for more detailed information.
This field displays the level of threat that the intrusion may pose. See
Table 63 on page 178
for more information on intrusion severity.
This field displays the what type of signature each one is. See
6.9.1 on page 176
for information on types of signatures.
This field displays the computer or network device operating system
that the intrusion targets or is vulnerable to the intrusion. These icons
represent a Windows operating system, a UNIX-based operating system
and a network device, respectively.
Select the check box in the heading row to automatically select all check
boxes and enable all signatures.
Clear it to clear all entries and disable all signatures on the current
page. For example, you could clear all check boxes for signatures that
targets operating systems not in your network. This would speed up the
IDP signature checking process.
Alternatively, you may select or clear individual entries. The check box
becomes gray when you select the check box.
If you edited any of the check boxes in this column on the current page,
use the check box in the heading row to switch between the settings
(last partial edited, all selected and all cleared).
Chapter 6 Device Security Settings
Table 62 on page
Table 64 on page 179
for action details.
177).
Section
183

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage cnm

Table of Contents