Content Security Gateway User’s Manual
2.Click OK.
3.High Risk: Select drop and log function.
4.Medium Risk: Select drop and log function.
5.Low Risk: Select pass and log function.
6.Click OK.
7.Enable IDP function in policy.
When the attack behavior matches the signature,
4.6.2 Signature
Provide relative compare rule to different attack behavior, include three sections: Anomaly,
Anomaly signature can allow user to define the signature, in order to detect and prevent the irregular attack behavior. Take Syn Flood as the example:
Definition:
Enable: Check to enable the protection for Syn Flood signature.
- 188 -