Pre-defined:
Pre-defined signature contains 5 general classifications, includes Backdoor, DDoS, Dos, Exploit,
NetBIOS and Spyware. Each type also includes its attack signatures, and user can select to
enable the specific signature defense system based on the request. (Figure 19-3)
User can modify the signature action of pass, drop, and log in each type.
The RS-3000 can display all the attack signature attribute of Name, Risk, Action and Log.
Figure19-3
The Pre-defined setting
Custom:
Except Anomaly and Pre-defined settings, the RS-3000 also provides a feature to allow user
modifying the custom signature, in order to block the specific intruder system.
Name:
The MIS engineer can define the signature name.
Protocol:
The detection and prevention protocol setting includes TCP, UDP, ICMP and IP.
Source Port:
To set the attack PC port.
(
Range: 0 ~ 65535
)
Destination Port:
To set the attacked (victim) PC port.
(
Range: 0 ~ 65535
)
Risk:
To define the threats of attack packets.
Action:
The action of attack packets.
Content:
To set the attack packets content.
215
Summary of Contents for RS-3000
Page 1: ...1 RS 3000 Office UTM Gateway User s Manual ...
Page 45: ...Figure 5 11 PPTP Connection Figure 5 12 Complete PPTP Connection Setting 43 ...
Page 133: ...Figure15 3 Traffic Log Monitor WebUI 131 ...
Page 142: ...Figure15 19 Complete Policy Setting 140 ...
Page 183: ...Figure17 33 Create Folder WebUI 181 ...
Page 185: ...Figure17 35 Select Folder for Spam Mail to move to 183 ...
Page 187: ...Figure17 37 Compact SpamMail Folder 185 ...
Page 189: ...Figure17 39 Copy the File Address that SpamMail File Store 187 ...
Page 192: ...Figure17 42 Confirm that All of the Mail in SpamMail File had been Deleted 190 ...
Page 194: ...Figure17 44 Create Folder Function WebUI 192 ...
Page 196: ...Figure17 46 Select the Folder for Needed Spam Mail to Move to 194 ...
Page 198: ...Figure17 48 Compact HamMail File 196 ...
Page 200: ...Figure17 50 Copy the File Address that HamMail File Store 198 ...