
Content Security Gateway User’s Manual
2. Click
OK
.
3.
High Risk
: Select drop and log function.
4.
Medium Risk
: Select drop and log function.
5.
Low Risk
: Select pass and log function.
6. Click
OK
.
7. Enable
IDP
function in policy.
When the attack behavior matches the signature, CS-500 will produce log as follows in
Log
function of
IDP Report.
4.6.2 Signature
Provide relative compare rule to different attack behavior, include three sections:
Anomaly,
Pre-defined
and
Custom
.
Anomaly:
Anomaly
signature can allow user to define the signature, in order to detect and prevent the irregular attack
behavior. Take
Syn Flood
as the example:
Definition:
Enable:
Check to enable the protection for Syn Flood signature.
- 188 -