TMS zl Management and Configuration Guide ST.1.0.090213

6-20
Intrusion Detection and Prevention
Threat Detection and Prevention
Figure 6-12. UDP Scan, Port Open
If the port is open, the host will return the requested data.
IP Protocol Scan
In this scan, the attacker attempts to discover which IP protocols are in use
on a host. If the target device is suspected to be a router, the attacker will
check for protocols such as EGP and IGP.
Figure 6-13. IP Protocol Scan, Protocol Not Present
If the protocol is not in use, the host does not respond. This example shows
a query for EGP.
Figure 6-14. IP Protocol Scan, Protocol Present