Content Security Gateway User’s Manual

Name: The System Manager can name the signature.

Protocol: Select the protocol which wants to be detected and prevented, it can be divided: TCP, UDP, ICMP and IP.

Source Port: Configure the port number that is used to attack the PC. (The range can be from 0 to 65535).

Destination Port: Configure the port number that the client PC is used to be attacked.

Risk: Define the threat about attack packets.

Action: Select Pass to pass the packets, or select Drop to discard the packets.

Log: Check Log function to record the log in IDP Report.

Content: Define the attack packets content.

EX. Use Pre-defined and Custom signature settings to detect and prevent attack behaviors STEP 1. Enter the following setting in Setting of Configure function.

STEP 2. Enter the following setting in Custom of Signature function:

„Click New Entry.

„Name: Enter Software_Crack_Website.

„Protocol: Select TCP.

„Source Port: Enter 0:65535.

-190 -