EasyManua.ls Logo

ZyXEL Communications 5 Series - Configuring the IDP Signatures Screen; Figure 167 SECURITY > IDP > Signature: Group View; Table 81 SECURITY > IDP > Signature: Group View

ZyXEL Communications 5 Series
824 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter 14 Intrusion Detection and Prevention (IDP) Screens
ZyWALL 5/35/70 Series User’s Guide
283
14.3.4 Configuring The IDP Signatures Screen
Click SECURITY >IDP > Signature to see the ZyWALL’s “group view” signature screen
where you can view signatures by attack type. To search for signatures based on other criteria
such as signature name or ID, then click the Switch to query view link to go to the “query
view” screen.
You can take actions on these signatures as described in Section 14.3.3 on page 282. To revert
to the default actions or to save sets of actions, go to the Backup & Restore screen.
Figure 167 SECURITY > IDP > Signature: Group View
The following table describes the labels in this screen.
Table 81 SECURITY > IDP > Signature: Group View
LABEL DESCRIPTION
Signature Groups
Switch to
query view
Click this hyperlink to go to a screen where you can search for signatures based on
criteria other than attack type.
Attack Type Select the type of signatures you want to view from the list box. See Section 14.3.1 on
page 281 for information on types of signatures.
The table displays the signatures of the type that you selected. Click a column’s
header to sort the entries by that attribute.
Go To Navigate between signatures found. This field is available only if there are more
signatures than that can be displayed on one screen.
Name The (read-only) signature name identifies a specific signature targeted at a specific
intrusion. Click the hyperlink for more detailed information on the intrusion.
ID Each intrusion has a unique identification number. This number may be searched at
myZyXEL.com for more detailed information.
Severity This field displays the level of threat that the intrusion may pose. See Table 79 on page
282 for more information on intrusion severity.
Platform This field displays the computer or network device operating system that the intrusion
targets or is vulnerable to the intrusion. These icons represent a Windows operating
system, a UNIX-based operating system and a network device respectively.

Table of Contents

Related product manuals