EasyManua.ls Logo

ZyXEL Communications ZyWALL USG-Series - How to Use SSH for Secure Telnet Access

ZyXEL Communications ZyWALL USG-Series
187 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
128
Note: If Internet Explorer opens a warning screen about a script making Internet Explorer
run slowly and the computer maybe becoming unresponsive, just click No to
continue.
2 The Traffic Anomaly screen will display. Type a new profile Name. Enable or disable individual scan
or flood types by selecting a row and clicking Activate or Inactivate. Selecting different levels in the
Sensitivity drop-down menu adjusts levels for scan thresholds and sample times. Edit the default log
options and actions by selecting a row and making a selection in the Log or Action drop-down menus.
Click OK.
3 Click the Protocol Anomaly tab. Type a new profile Name. Enable or disable individual rules by
selecting a row and clicking Activate or Inactivate. Edit the default log options and actions by
selecting a row and making a selection in the Log or Action drop-down menus. Click OK.

Table of Contents

Other manuals for ZyXEL Communications ZyWALL USG-Series

Related product manuals