Content Security Gateway User’s Manual

2.Click OK.

3.High Risk: Select drop and log function.

4.Medium Risk: Select drop and log function.

5.Low Risk: Select pass and log function.

6.Click OK.

7.Enable IDP function in policy.

‹When the attack behavior matches the signature, CS-500 will produce log as follows in Log function of IDP Report.

4.6.2 Signature

Provide relative compare rule to different attack behavior, include three sections: Anomaly, Pre-definedand Custom.

Anomaly:

Anomaly signature can allow user to define the signature, in order to detect and prevent the irregular attack behavior. Take Syn Flood as the example:

Definition:

Enable: Check to enable the protection for Syn Flood signature.

- 188 -