Network Intrusion Detection System (NIDS)
Detecting attacks
FortiGate-60R Installation and Configuration Guide
221
Viewing the signature list
To display the current list of NIDS signature groups and to view the members of a
signature group:
1
Go to
NIDS > Detection > Signature List
.
2
View the names and action status of the signature groups in the list.
The NIDS detects attacks listed in all the signature groups that are checked in the
Modify or Details column.
3
Select View Details
.to display the members of a signature group.
The Signature Group Members list displays the attack ID, Rule Name, and Revision
number for each group member.
Viewing attack descriptions
Fortinet provides online information for all NIDS attacks. To view the FortiResponse
Attack Analysis web page for an attack listed on the signature list:
1
Go to
NIDS > Detection > Signature List
.
2
Select View Details
.to display the members of a signature group.
Select a signature and copy its attack ID.
3
Open a web browser and enter this URL:
http://www.fortinet.com/ids/ID<attack-ID>
Remember to include the attack ID.
For example, to view the Fortinet Attack Analysis web page for the
ssh CRC32
overflow /bin/sh
attack (ID 101646338), use the following URL:
http://www.fortinet.com/ids/ID101646338
Figure 34: Example signature group members list
Note:
The user-defined signature group is the last item in the signature list. See
“Adding user-
defined signatures” on page 222
.
Note:
Each attack log message includes a URL that links directly to the FortiResponse Attack
Analysis web page for that attack. This URL is available from the Attack Log messages and
Alert email messages. For information about log message content and formats, and about log
locations, see the
Logging Configuration and Reference Guide.
To log attack messages, see
“Logging attacks” on page 226
.
Summary of Contents for FortiGate 60R
Page 12: ...Contents 12 Fortinet Inc...
Page 26: ...26 Fortinet Inc Customer service and technical support Introduction...
Page 42: ...42 Fortinet Inc Next steps Getting started...
Page 138: ...138 Fortinet Inc Customizing replacement messages System configuration...
Page 228: ...228 Fortinet Inc Logging attacks Network Intrusion Detection System NIDS...
Page 242: ...242 Fortinet Inc Exempt URL list Web filtering...
Page 256: ...256 Fortinet Inc Configuring alert email Logging and reporting...
Page 260: ...260 Fortinet Inc Glossary...
Page 270: ...270 Fortinet Inc Index...