D-Link DFL-260E User Manual page 538

Network security firewall netdefendos version 2.27.03
Hide thumbs Also See for DFL-260E:
Table of Contents

Advertisement

Group Name
POP3_DOS
POP3_GENERAL
POP3_LOGIN-ATTACKS
POP3_OVERFLOW
POP3_REQUEST-ERRORS
PORTMAPPER_GENERAL
PRINT_GENERAL
PRINT_OVERFLOW
REMOTEACCESS_GOTOMYPC
REMOTEACCESS_PCANYWHERE
REMOTEACCESS_RADMIN
REMOTEACCESS_VNC-CLIENT
REMOTEACCESS_VNC-SERVER
REMOTEACCESS_WIN-TERMINAL
RLOGIN_GENERAL
RLOGIN_LOGIN-ATTACK
ROUTER_CISCO
ROUTER_GENERAL
ROUTING_BGP
RPC_GENERAL
RPC_JAVA-RMI
RSYNC_GENERAL
SCANNER_GENERAL
SCANNER_NESSUS
SECURITY_GENERAL
SECURITY_ISS
SECURITY_MCAFEE
SECURITY_NAV
SMB_ERROR
SMB_EXPLOIT
SMB_GENERAL
SMB_NETBIOS
SMB_WORMS
SMTP_COMMAND-ATTACK
SMTP_DOS
SMTP_GENERAL
SMTP_OVERFLOW
SMTP_SPAM
SNMP_ENCODING
SNMP_GENERAL
SOCKS_GENERAL
SSH_GENERAL
SSH_LOGIN-ATTACK
SSH_OPENSSH
SSL_GENERAL
TCP_GENERAL
TCP_PPTP
TELNET_GENERAL
TELNET_OVERFLOW
TFTP_DIR_NAME
TFTP_GENERAL
Intrusion Type
Denial of Service for POP
Post Office Protocol v3
Password guessing and related login attack
POP3 server overflow
Request Error
PortMapper
LP printing server: LPR LPD
Overflow of LPR/LPD protocol/implementation
Goto MY PC
PcAnywhere
Remote Administrator (radmin)
Attacks targeting at VNC Clients
Attack targeting at VNC servers
Windows terminal/Remote Desktop
RLogin protocol and implementation
Login attacks
Cisco router attack
General router attack
BGP router protocol
RFC protocol and implementation
Java RMI
Rsync
Generic scanners
Nessus Scanner
Anti-virus solutions
Internet Security Systems software
McAfee
Symantec AV solution
SMB Error
SMB Exploit
SMB attacks
NetBIOS attacks
SMB worms
SMTP command attack
Denial of Service for SMTP
SMTP protocol and implementation
SMTP Overflow
SPAM
SNMP encoding
SNMP protocol/implementation
SOCKS protocol and implementation
SSH protocol and implementation
Password guess and related login attacks
OpenSSH Server
SSL protocol and implementation
TCP protocol and implementation
Point-to-Point Tunneling Protocol
Telnet protocol and implementation
Telnet buffer overflow attack
Directory Name attack
TFTP protocol and implementation
538
Appendix B. IDP Signature Groups

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents