Chapter 6 Device Security Settings
Vantage CNM User’s Guide
178
6.9.2 Intrusion Severity
Intrusions are assigned a severity level based on the following table. The intrusion
severity level then determines the default signature action.
6.9.3 Signature Actions
You can enable/disable individual signatures. You can log and/or have an alert
sent when traffic meets a signature criteria. You can also change the default action
IM
IM (Instant Messaging) refers to chat applications. Chat is real-time
communication between two or more users via networks-connected
computers. After you enter a chat (or chat room), any member can type
a message that will appear on the monitors of all the other participants.
VirusWorm
A computer virus is a small program designed to corrupt and/or alter
the operation of other legitimate programs. A worm is a program that is
designed to copy itself from one computer to another on a network. A
worm’s uncontrolled replication consumes system resources thus
slowing or stopping other tasks.
The IDP VirusWorm category refers to network-based viruses and
worms. The Anti-Virus (AV) screen refers to file-based viruses and
worms. Refer to the anti-virus chapter for additional information on file-
based anti-virus scanning in the device.
Porn
The device can block web sites if their URLs contain certain
pornographic words. It cannot block web pages containing those words
if the associated URL does not.
WebAttacks
Web attack signatures refer to attacks on web servers such as IIS
(Internet Information Services).
SPAM
Spam is unsolicited "junk" e-mail sent to large numbers of people to
promote products or services. Refer to the anti-spam chapter for more
detailed information.
Table 62
Device Operation > Device Configuration > Security > IDP > Signature >
Attack Types (continued)
TYPE
DESCRIPTION
Table 63
Device Operation > Device Configuration > Security > IDP > Signature >
Intrusion Severity
SEVERITY
DESCRIPTION
Severe
These are intrusions that try to run arbitrary code or gain system
privileges.
High
These are known serious vulnerabilities or intrusions that are probably not
false alarms.
Medium
These are medium threats, access control intrusions or intrusions that
could be false alarms.
Low
These are mild threats or intrusions that could be false alarms.
Very Low
These are possible intrusions caused by traffic such as Ping, trace route,
ICMP queries etc.
Summary of Contents for VANTAGE CNM
Page 2: ......
Page 20: ...New Template User s Guide 20...
Page 23: ...23 PART I Introduction Introducing Vantage CNM 21 GUI Introduction 25...
Page 24: ...24...
Page 46: ...46...
Page 50: ...Chapter 3 Load or Save Building Blocks BB Vantage CNM User s Guide 50...
Page 140: ...Chapter 6 Device Security Settings Vantage CNM User s Guide 140 IKE Gateway Policy Add Edit...
Page 242: ...Chapter 8 Device Log Vantage CNM User s Guide 242...
Page 246: ...246...
Page 346: ...Chapter 11 IPSec VPN Vantage CNM User s Guide 346...
Page 356: ...Chapter 13 L2TP VPN Vantage CNM User s Guide 356...
Page 384: ...Chapter 14 Vantage CNM User s Guide 384...
Page 408: ...408...
Page 456: ...Chapter 18 Firmware Management Vantage CNM User s Guide 456...
Page 474: ...474...
Page 494: ...494...
Page 534: ...Chapter 26 Device Alarm Vantage CNM User s Guide 534...
Page 535: ...535 PART VII Log Report Device Operation Report 537 CNM Logs 553 VRPT 555...
Page 536: ...536...
Page 552: ...Chapter 27 Device Operation Report Vantage CNM User s Guide 552...
Page 560: ...560...
Page 580: ...Chapter 30 CNM System Setting Vantage CNM User s Guide 580...
Page 588: ...Chapter 33 Vantage CNM Software Upgrade Vantage CNM User s Guide 588...
Page 592: ...Chapter 35 About CNM Vantage CNM User s Guide 592...
Page 593: ...593 PART IX Account Management User Group 595 Account 599...
Page 594: ...594...
Page 598: ...Chapter 36 User Group Vantage CNM User s Guide 598...
Page 603: ...603 PART X Troubleshooting Troubleshooting 605...
Page 604: ...604...
Page 610: ...610...
Page 616: ...Appendix A Product Specifications Vantage CNM User s Guide 616...
Page 634: ...Appendix B Setting up Your Computer s IP Address Vantage CNM User s Guide 634...
Page 656: ...Appendix E IP Address Assignment Conflicts Vantage CNM User s Guide 656...
Page 666: ...Appendix G Importing Certificates Vantage CNM User s Guide 666...