HP VPN Firewall Appliances Attack Protection Configuration Guide

7
The intrusion detection statistics reflect the counts of attacks as per attack type, and the counts of attack
packets dropped. This helps you analyze the intrusion types and quantities to generate better network
security policies.
For information about packet inspection, see "Configuring packet inspection." For information about
traffic abnormality detection, see "Types of network attacks the device can defend against."
Configuring attack detection and protection in the
Web interface
Configuring packet inspection
1. From the navigation tree, select Intrusion Detection > Packet Inspection.
Figure 5 Packet inspection configuration page
2. Configure packet inspection, as described in Table 2.
3. Click Apply.
Table 2 Configuration items
Item Descri
p
tion
Zone
Select a zone to detect attacks from the zone.
Discard Packets when the specified attack is detected Select this option to discard detected attack packets.
Enable Fraggle Attack Detection
Enable or disable detection of Fraggle attacks.
Enable Land Attack Detection
Enable or disable detection of Land attacks.
Enable WinNuke Attack Detection
Enable or disable detection of WinNuke attacks.
Enable TCP Flag Attack Detection
Enable or disable detection of TCP flag attacks.