TMS zl Management and Configuration Guide ST.1.0.090213
6-35
Intrusion Detection and Prevention
Configuring IDS/IPS
Figure 6-23. Intrusion Prevention > Signatures > Download Window
3. If you use a proxy server to connect to the Internet, select the Use a proxy
server check box.
•In the Address field, type the IP address or FQDN of the proxy server.
•In the Port field, type the port number to access the proxy server.
• Click Apply My Changes.
4. To specify how often the TMS zl Module checks for updates, select the
interval from the list in the Settings section. From this time forward, the
module will automatically check for new signatures at the time interval
specified.
5. Click Apply My Changes.
6. Click Save.
7. Routing Mode Only: Select Firewall > Access Policies > Unicast. Ensure
that you have a unicast firewall access policy that permits Self-to-External
traffic or traffic from the Self zone to the zone where your Internet proxy
server resides. Create a new policy if necessary. (See “Firewall Access
Policies” in Chapter 4: “Firewall.”)
8. Return to Intrusion Prevention > Signatures > Download or Intrusion Detection
> Signatures > Download.