Pre-defined
Available signatures are Attack Responses, Backdoor, Bad Traffic, Chat, DDoS,
DNS, DoS, Exploit, Finger, FTP, ICMP, IMAP, Info, Misc, MySQL, NetBIOS,
NNTP, Oracle, Policy, POP2, POP3, Porn, RPC, Rservices, Scan, Shellcode,
SMTP, SNMP, Spyware, SQL, Telnet, TFTP, Web CGI, Web Client, Web
Coldfusion, Web Frontpage, Web IIS, Web Misc, Web PHP, X11 and other.
(Figure 19-2)
You may specify the action taken upon the detection of an anomaly flow.
Available actions are Pass, Drop, Reject, Log and Alert.
612