Chapter 3 Protect Your Network with UTM
Figure 119 CONFIGURATION > Security Policy > ADP > Profile > Base Profile > Traffic Anomaly
Click the Protocol Anomaly tab. A Name is automatically generated that you can edit. Enable or
3
disable individual rules by selecting a row and clicking Activate or Inactivate. Edit the default log
options and actions by selecting a row and making a selection in the Log or Action drop-down
menus. Click OK.
ZyWALL/USG Series User's Guide
65