
642
Field descriptions
Policy field descriptions
IDS/IPS Policy Properties dialog box—Description tab
Optionally, provides an extended description. This information is useful to help track changes or it can
be used as criteria for searches.
The maximum length is 20,000 alphanumeric characters.
IDS/IPS—Configuration tab
On the Configuration tab, you can enable or disable event detection and logging, block traffic when
specified events are detected, and filter intrusion events. You can also display the signatures
associated with a selected IDS/IPS policy. You can then modify the signatures as needed and apply all
of the modifications by enabling the IDS/IPS policy on an interface.
Associated tasks
The tasks that you can perform with this tab are:
■
■
“Modifying event log and block settings”
Heuristic
Heuristic detection level for the selected IDS/IPS policy.
Options are:
■
Low
This low security IDS/IPS policy can be applied to inside interfaces.
■
Medium
This medium security IDS/IPS policy can be applied to service networks.
■
High
This high security IDS/IPS policy can be applied to outside interfaces.
■
Very High
This very high security IDS/IPS policy enables more logging and blocking settings in events.
Note:
You must determine the level of security you require and apply the IDS/IPS policy that is
appropriate to your network resources.
Caption
An optional, brief description of the selected IDS/IPS policy.
The maximum length is 128 characters.
For longer descriptions, use the Description tab.
Table D-83
IDS/IPS Policy Properties dialog box—General tab
Field
Description
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...