Configuring Idp Signatures - ZyXEL Communications Vantage CNM 2.3 User Manual

Centralized network management
Hide thumbs Also See for Vantage CNM 2.3:
Table of Contents

Advertisement

to be taken when a packet or stream matches a signature. The following figure
and table describes these actions. Note that in addition to these actions, a log may
be generated or an alert sent, if those check boxes are selected and the signature
is enabled.
Figure 71 Device Operation > Device Configuration > Security > IDP > Signature >
Actions
The following table describes signature actions.
Table 64 Device Operation > Device Configuration > Security > IDP > Signature >
Actions
ACTION
No Action
Drop Packet
Drop Session
Reset Sender
Reset Receiver
Reset Both

6.9.4 Configuring IDP Signatures

Use this screen to see the device's "group view" signature screen where you can
view signatures by attack type. To search for signatures based on other criteria
such as signature name or ID, then click the Switch to query view link to go to
the "query view" screen.
You can take actions on these signatures as described in
178. To revert to the default actions or to save sets of actions, go to the Device
Vantage CNM User's Guide
DESCRIPTION
The intrusion is detected but no action is taken.
The packet is silently discarded.
When the firewall is enabled, subsequent TCP/IP packets belonging
to the same connection are dropped. Neither sender nor receiver are
sent TCP RST packets. If the firewall is not enabled only the packet
that matched the signature is dropped.
When the firewall is enabled, the TCP/IP connection is silently torn
down. Just the sender is sent TCP RST packets. If the firewall is not
enabled only the packet that matched the signature is dropped.
When the firewall is enabled, the TCP/IP connection is silently torn
down. Just the receiver is sent TCP RST packets. If the firewall is not
enabled only the packet that matched the signature is dropped.
When the firewall is enabled, the TCP/IP connection is silently torn
down. Both sender and receiver are sent TCP RST packets. If the
firewall is not enabled only the packet that matched the signature is
dropped.
Chapter 6 Device Security Settings
Section 6.9.3 on page
179

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage cnm

Table of Contents