Nokia IP60 User Manual page 302

Security appliance
Hide thumbs Also See for IP60:
Table of Contents

Advertisement

SmartDefense Categories
You can specify how HTTP-based worm attacks should be handled.
Table 79: Worm Catcher Fields
In this field...
Do this...
Action
Specify what action to take when an HTTP-based worm attack is
detected, by selecting one of the following:
Track
Specify whether to log HTTP-based worm attacks, by selecting one of
the following:
HTTP-based worm
patterns list
Microsoft Networks
This category includes File and Print Sharing.
Microsoft operating systems and Samba clients rely on Common Internet File System (CIFS), a protocol
for sharing files and printers. However, this protocol is also widely used by worms as a means of
propagation.
302
Block. Block the attack.
None. No action. This is the default.
Log. Log the attack.
None. Do not log the attack. This is the default.
Select the worm patterns to detect.
Nokia IP60 Security Appliance User Guide

Advertisement

Table of Contents
loading

Table of Contents