HP TMS zl Module Security Administrator's Guide
3-8
Configuring a TMS zl Module as an IPS
Viewing Intrusion Prevention Data
.
Figure 3-3. TMS-IPS Tab, Signatures Subtab
Available Signatures Signature name listed in the signature file
Signature ID ID number used to identify the signature
Threat Level The severity level assigned to the threat:
Critical Attack may disable or damage network or targeted devices
Severe Attack may result in greatly reduced performance of
network or targeted devices
Warning Attack may cause nuisance traffic or TMS zl module
behavior
Information Attack may be harmless
Minor Attack may be harmless