643
Field descriptions
Policy field descriptions
IDS Event Type Properties dialog box—General tab
The IDS Event Type Properties dialog box lets you review signature details, including an overview,
definitions and functions, possible false positives, affected products and components, and additional
references.
Table D-84
IDS Event Type Properties dialog box—General tab
Field
Description
Event
Displays the name of the event.
The maximum length is 200 characters.
Allowed characters are a-z, A-Z, numerals, periods (.), dashes (-), and underscores (_).
Do not include spaces in the name. The characters @,!,#,$,%,^,&,*,<,> and other reserved
characters are also invalid.
This field is read-only.
Date modified
Displays the date when the selected event was last modified.
This field is read-only.
Policy
Displays the policy on which the selected event is based.
There are four types of policies:
■
Low_Security
A low security IDS/IPS policy can be applied to inside interfaces.
■
Medium_Security
A medium security IDS/IPS policy can be applied to service networks.
■
High_Security
A high security IDS/IPS policy can be applied to outside interfaces.
■
Very_High_Security
A very high security IDS/IPS policy enables more logging and blocking settings in
events.
Note:
You must determine the level of security you require and apply the IDS/IPS policy that
is appropriate to your network resources.
This field is read-only.
Log this event
Indicates whether this option is enabled.
The default setting is dependent on the specific event.
You can also enable and disable logging on the Table view.
Block traffic if this
event is detected
Indicates whether this option is enabled.
The default setting is dependent on the specific event.
You can also enable and disable blocking on the Table view.
Caption
An optional, brief description of the selected event.
The maximum length is 128 characters.
For longer descriptions, use the Description tab.
Protocol
Displays the protocol(s) assigned to the selected event.
This field is read-only.
Category
Displays the categories of attacks that apply to this event.
This field is read-only.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...