D-Link DFL-2400 [66/112] Fill defense policy attributes

D-Link DFL-2400 [66/112] Fill defense policy attributes
DFL-2100/DFL-2400 Intrusion Detection System User Manual
5
6
Fill Defense Policy Attributes
In “Defense Policy Attribute” frame, you have to give some information about the
attack you want to detection or the access you want to control.
1. Attack name:
The name is given to identify, to show on the reporting system or emails.
It must be a unique one.
2. Attack type:
Determine what kind of attack that this belongs to. Available options are:
DDOS, Buffer Overflow, Access Control, Scan, Trojan Horse and etc.
3. Affected OS type:
Determined what kind of OS would be suitable to apply this policy. This
field can have multiple options.
4. Protocol type:
What kind of layer 4 protocol that this policy is on, it can be TCP, UDP,
ICMP and IGMP. If you want to detect IP packets only, choosing IP is fine.
5. Attack Severity:
It defines the dangerous level of the attack that this policy wants to detect.
Figure 6-3: The” Defense Policy Attributes” Frame

Содержание

Скачать