Chapter 34 IDP
ZyWALL USG 300 User’s Guide
618
The following table describes the fields in this screen.
Table 169
Configuration > Anti-X > IDP > Custom Signatures > Add/Edit
LABEL
DESCRIPTION
Name
Type the name of your custom signature. You may use 1-31
alphanumeric characters, underscores(
_
), or dashes (-), but the first
character cannot be a number. This value is case-sensitive.
Duplicate names can exist but it is advisable to use unique signature
names that give some hint as to intent of the signature and the type
of attack it is supposed to prevent. Refer to (but do not copy) the
packet inspection signature names for hints on creating a naming
convention.
Signature ID
A signature ID is automatically created when you click the
Add
icon
to create a new signature. You can edit the ID to create a new one (in
the 9000000 to 9999999 range), but you cannot use one that already
exists. You may want to do that if you want to order custom
signatures by SID.
Information
Use the following fields to set general information about the
signature as denoted below.
Severity
The severity level denotes how serious the intrusion is. Categorize
the seriousness of the intrusion here. See
as a
reference.
Platform
Some intrusions target specific operating systems only. Select the
operating systems that the intrusion targets, that is, the operating
systems you want to protect from this intrusion. SGI refers to Silicon
Graphics Incorporated, who manufactures multi-user Unix
workstations that run the IRIX operating system (SGI's version of
UNIX). A router is an example of a network device.
Service
Select the IDP service group that the intrusion exploits or targets.
See
for a list of IDP service groups. The
custom signature then appears in that group in the
IDP > Profile >
Group View
screen.
Policy Type
Categorize the type of intrusion here. See
as
a reference.
Frequency
Recurring packets of the same type may indicate an attack. Use the
following field to indicate how many packets per how many seconds
constitute an intrusion
Threshold
Select
Threshold
and then type how many packets (that meet the
criteria in this signature) per how many seconds constitute an
intrusion.
Header Options
Network Protocol
Configure signatures for IP version 4.
Type Of Service Type of service in an IP header is used to specify levels of speed and/
or reliability. Some intrusions use an invalid
Type Of Service
number. Select the check box, then select
Equal
or
Not-Equal
and
then type in a number.
Identification
The identification field in a datagram uniquely identifies the
datagram. If a datagram is fragmented, it contains a value that
identifies the datagram to which the fragment belongs. Some
intrusions use an invalid
Identification
number. Select the check
box and then type in the invalid number that the intrusion uses.
Содержание Unified Security Gateway ZyWALL 300
Страница 2: ......
Страница 30: ...Table of Contents ZyWALL USG 300 User s Guide 30 ...
Страница 31: ...31 PART I User s Guide ...
Страница 32: ...32 ...
Страница 38: ...Chapter 1 Introducing the ZyWALL ZyWALL USG 300 User s Guide 38 ...
Страница 46: ...Chapter 2 Features and Applications ZyWALL USG 300 User s Guide 46 ...
Страница 64: ...Chapter 3 Web Configurator ZyWALL USG 300 User s Guide 64 ...
Страница 74: ...Chapter 4 Installation Setup Wizard ZyWALL USG 300 User s Guide 74 ...
Страница 116: ...Chapter 6 Configuration Basics ZyWALL USG 300 User s Guide 116 ...
Страница 128: ...Chapter 7 Tutorials ZyWALL USG 300 User s Guide 128 Figure 73 Configuration Network Interface WLAN Add ...
Страница 184: ...Chapter 7 Tutorials ZyWALL USG 300 User s Guide 184 ...
Страница 221: ...221 PART II Technical Reference ...
Страница 222: ...222 ...
Страница 288: ...Chapter 11 Registration ZyWALL USG 300 User s Guide 288 ...
Страница 303: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 303 Figure 269 Configuration Network Interface Ethernet Edit ...
Страница 320: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 320 Figure 275 Configuration Network Interface Cellular Add ...
Страница 330: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 330 Figure 278 Configuration Network Interface WLAN Add No Security ...
Страница 345: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 345 Figure 286 Configuration Network Interface VLAN Edit ...
Страница 355: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 355 Figure 288 Configuration Network Interface Bridge Add ...
Страница 378: ...Chapter 14 Trunks ZyWALL USG 300 User s Guide 378 ...
Страница 394: ...Chapter 15 Policy and Static Routes ZyWALL USG 300 User s Guide 394 ...
Страница 408: ...Chapter 16 Routing Protocols ZyWALL USG 300 User s Guide 408 ...
Страница 428: ...Chapter 19 NAT ZyWALL USG 300 User s Guide 428 ...
Страница 454: ...Chapter 23 Authentication Policy ZyWALL USG 300 User s Guide 454 ...
Страница 472: ...Chapter 24 Firewall ZyWALL USG 300 User s Guide 472 ...
Страница 479: ...Chapter 25 IPSec VPN ZyWALL USG 300 User s Guide 479 Figure 355 Configuration VPN IPSec VPN VPN Connection Edit IKE ...
Страница 490: ...Chapter 25 IPSec VPN ZyWALL USG 300 User s Guide 490 Figure 358 Configuration VPN IPSec VPN VPN Gateway Edit ...
Страница 534: ...Chapter 27 SSL User Screens ZyWALL USG 300 User s Guide 534 ...
Страница 536: ...Chapter 28 SSL User Application Screens ZyWALL USG 300 User s Guide 536 ...
Страница 544: ...Chapter 29 SSL User File Sharing ZyWALL USG 300 User s Guide 544 ...
Страница 638: ...Chapter 35 ADP ZyWALL USG 300 User s Guide 638 Figure 448 Profiles Protocol Anomaly ...
Страница 682: ...Chapter 37 Content Filter Reports ZyWALL USG 300 User s Guide 682 ...
Страница 700: ...Chapter 38 Anti Spam ZyWALL USG 300 User s Guide 700 ...
Страница 722: ...Chapter 39 Device HA ZyWALL USG 300 User s Guide 722 ...
Страница 738: ...Chapter 40 User Group ZyWALL USG 300 User s Guide 738 ...
Страница 744: ...Chapter 41 Addresses ZyWALL USG 300 User s Guide 744 ...
Страница 756: ...Chapter 43 Schedules ZyWALL USG 300 User s Guide 756 ...
Страница 772: ...Chapter 45 Authentication Method ZyWALL USG 300 User s Guide 772 ...
Страница 794: ...Chapter 46 Certificates ZyWALL USG 300 User s Guide 794 ...
Страница 806: ...Chapter 48 SSL Application ZyWALL USG 300 User s Guide 806 ...
Страница 811: ...Chapter 49 Endpoint Security ZyWALL USG 300 User s Guide 811 ...
Страница 866: ...Chapter 50 System ZyWALL USG 300 User s Guide 866 ...
Страница 873: ...Chapter 51 Log and Report ZyWALL USG 300 User s Guide 873 ...
Страница 886: ...Chapter 51 Log and Report ZyWALL USG 300 User s Guide 886 ...
Страница 916: ...Chapter 54 Packet Flow Explore ZyWALL USG 300 User s Guide 916 ...
Страница 918: ...Chapter 55 Reboot ZyWALL USG 300 User s Guide 918 ...
Страница 920: ...Chapter 56 Shutdown ZyWALL USG 300 User s Guide 920 ...
Страница 948: ...Chapter 58 Product Specifications ZyWALL USG 300 User s Guide 948 ...
Страница 1014: ...Appendix A Log Descriptions ZyWALL USG 300 User s Guide 1014 ...
Страница 1124: ...Appendix F Open Software Announcements ZyWALL USG 300 User s Guide 1124 ...
Страница 1156: ...Index ZyWALL USG 300 User s Guide 1156 ...