182 Detecting
Configuring signature detection
■
In
Protocol
, enter a protocol from the pull-down list.
■
In
Transit Type
, which is active if you chose IP_OTHER from the
Protocol pull-down list, enter a transit type from the pull-down list.
3
Click
Next
to proceed.
4
In
Signature Description
, enter optional notes, and click
Next
.
5
In
User-defined Signature
or
Edit User-defined Signature
, provide
information for the following fields:
■
In
Source IP
,
Source Port
,
Destination IP
,
and Destination Port
, enter
this information from the pull-down lists.
■
If Transit Type is TCP, in
Match Type
, click one of the following:
—Click
Stream
to create a stream-based signature.
—Click
Packet
to create a packet-based signature.
Note that if you select anything other than TCP for Transit Type, Match
Type is disabled.
■
In
Direction
, click
server-bound
or
client-bound
from the pull-down
list.
■
In
Encoding
, enter the information from the pull-down list and click
Next
.
6
In
User-defined Signature
or
Edit User-defined Signature
, click
Add
and
do one of the following:
■
Click
Any Payload Offset
, or specify a specific payload offset value.
■
In
Regular Expression
, enter a regular expression, and click
OK
.
You can use default or user-defined Signature Variables in this
expression.
See
“Adding new signature variables”
on page 184.
7
If you return to
User-defined Signature
or
Edit User-defined Signature
,
you can do the following:
■
Click
Preview Signature
to view a text file version.
■
Click
Back
to return to a previous step and change it.
■
Click
Finish
to save and close.
■
Click
Cancel
to exit without saving your work.
8
In
User-defined Signatures
, click
Apply
.
Note:
Expect a short delay before the signature is available to use.
9
After synchronization, reapply the edited signatures to the appropriate
monitoring interfaces for the changes to take effect.
See
“Setting policies to interfaces”
on page 115.
Содержание 10521146 - Network Security 7120
Страница 1: ...Symantec Network Security Administration Guide...
Страница 12: ...12 Contents Index...
Страница 14: ...14...
Страница 70: ...70...
Страница 110: ...110 Populating the topology database Adding nodes and objects...
Страница 158: ...158 Responding Managing flow alert rules...
Страница 188: ...188...
Страница 242: ...242 Reporting Playing recorded traffic...
Страница 268: ...268 Managing log files Exporting data...
Страница 316: ...316 Advanced configuration Configuring advanced parameters...
Страница 317: ...Part IV Appendices The following appendices provide additional reference information User groups reference SQL reference...
Страница 318: ...318...
Страница 338: ...338 SQL reference Using MySQL tables...
Страница 366: ...366 Glossary...
Страница 392: ...392 Index...