Nokia IP60 User Manual page 303

Security appliance
Hide thumbs Also See for IP60:
Table of Contents

Advertisement

You can configure how CIFS worms should be handled.
Table 80: File Print and Sharing Fields
In this field...
Do this...
Action
Specify what action to take when a CIFS worm attack is detected, by
selecting one of the following:
Track
Specify whether to log CIFS worm attacks, by selecting one of the
following:
CIFS worm patterns
list
Chapter 13: Using SmartDefense
Block. Block the attack.
None. No action. This is the default.
Log. Log the attack.
None. Do not log the attack. This is the default.
Select the worm patterns to detect.
Patterns are matched against file names (including file paths but
excluding the disk share name) that the client is trying to read or
write from the server.
SmartDefense Categories
303

Advertisement

Table of Contents
loading

Table of Contents