Planet Networking & Communication CS-2001 User Manual page 612

Utm content security gateway
Table of Contents

Advertisement

Terms in Signatures
Anomaly
Available signatures are syn flood, udp flood, icmp flood, portscan and http
insptct.
(Figure 19-1)
You may specify the action taken upon the detection of an anomaly flow.
Available actions are Pass, Drop and Reject. Available Alert are Log and Alert.
Figure 19-1 Anomaly Settings
611

Advertisement

Table of Contents
loading

Table of Contents