Fortinet FortiGate Series Administration Manual page 539

Hide thumbs Also See for FortiGate Series:
Table of Contents

Advertisement

Intrusion Protection
FortiGate Version 4.0 MR1 Administration Guide
01-410-89802-20090903
http://docs.fortinet.com/
Feedback
Figure 320: Edit IPS sensor
Signature attributes
IPS sensor attributes:
Name
The name of the IPS sensor. You can change it at any time.
Comments
An optional comment describing the IPS sensor. You can change it at any time.
OK
Select to save changes to Name or Comments
IPS sensor filters:
Add Filter
Add a new filter to the end of the filter list. For more information, see
"Configuring filters" on page
#
Current position of each filter in the list.
Name
The name of the filter.
Signature
Signature attributes specify the type of network traffic the signature applies to.
attributes
Severity
Target
Protocol
OS
Application
Enable
The status of the signatures included in the filter. The signatures can be set to
enabled, disabled, or default. The default setting uses the default status of each
individual signature as displayed in the signature list.
Logging
The logging status of the signatures included in the filter. Logging can be set to
enabled, disabled, or default. The default setting uses the default status of each
individual signature as displayed in the signature list.
Action
The action of the signatures included in the filter. The action can be set to pass
all, block all, reset all, or default. The default setting uses the action of each
individual signature as displayed in the signature list.
Count
The number of signatures included in the filter. Overrides are not included in this
total.
Delete icon
Delete the filter.
Edit icon
Edit the filter.
Insert icon
Create a new filter and insert it above the current filter.
Move to icon
After selecting this icon, enter the destination position in the window that
appears, and select OK.
540.
The severity of the included signatures.
The type of system targeted by the attack. The targets are client
and server.
The protocols to which the signatures apply. Examples include
HTTP, POP3, H323, and DNS.
The operating systems to which the signatures apply.
The applications to which the signatures apply.
IPS sensors
Insert
Edit
Move To
Delete
View
539

Advertisement

Table of Contents
loading

Table of Contents