Content Security Gateway User’s Manual
Name: The System Manager can name the signature.
Protocol: Select the protocol which wants to be detected and prevented, it can be divided: TCP, UDP, ICMP and IP.
Source Port: Configure the port number that is used to attack the PC. (The range can be from 0 to 65535).
Destination Port: Configure the port number that the client PC is used to be attacked.
Risk: Define the threat about attack packets.
Action: Select Pass to pass the packets, or select Drop to discard the packets.
Log: Check Log function to record the log in IDP Report.
Content: Define the attack packets content.
EX. Use
STEP 2. Enter the following setting in Custom of Signature function:
Click New Entry.Name: Enter Software_Crack_Website.
Protocol: Select TCP.
Source Port: Enter 0:65535.
-190 -