Terms in Signatures
Anomaly
Available signatures are syn flood, udp flood, icmp flood, portscan and http
insptct.
(Figure 19-1)
You may specify the action taken upon the detection of an anomaly flow.
Available actions are Pass, Drop and Reject. Available Alert are Log and Alert.
Figure 19-1 Anomaly Settings
611