
Contents
Network Intrusion Detection System (NIDS) | 249 |
Detecting attacks | 249 |
Selecting the interfaces to monitor | 250 |
Disabling the NIDS | 250 |
Configuring checksum verification | 250 |
Viewing the signature list | 251 |
Viewing attack descriptions | 251 |
Enabling and disabling NIDS attack signatures | 252 |
Adding | 252 |
Preventing attacks | 253 |
Enabling NIDS attack prevention | 253 |
Enabling NIDS attack prevention signatures | 254 |
Setting signature threshold values | 254 |
Configuring synflood signature values | 256 |
Logging attacks | 256 |
Logging attack messages to the attack log | 256 |
Reducing the number of NIDS attack log and email messages | 257 |
Antivirus protection | 259 |
General configuration steps | 259 |
Antivirus scanning | 260 |
File blocking | 261 |
Blocking files in firewall traffic | 262 |
Adding file patterns to block | 262 |
Quarantine | 263 |
Quarantining infected files | 263 |
Quarantining blocked files | 263 |
Viewing the quarantine list | 264 |
Sorting the quarantine list | 264 |
Filtering the quarantine list | 265 |
Deleting files from quarantine | 265 |
Downloading quarantined files | 265 |
Configuring quarantine options | 265 |
Blocking oversized files and emails | 266 |
Configuring limits for oversized files and email | 266 |
Exempting fragmented email from blocking | 266 |
Viewing the virus list | 266 |
Web filtering | 267 |
General configuration steps | 267 |
Content blocking | 268 |
Adding words and phrases to the banned word list | 268 |
11 |