TMS zl Management and Configuration Guide ST.1.0.090213
6-38
Intrusion Detection and Prevention
Configuring IDS/IPS
Figure 6-25. Intrusion Prevention > Signatures > View Window
The Intrusion Prevention (Detection) > Signatures > View windows lists the
following information about each signature:
• Name—Name of the attack, usually an industry-standard name
• Threat Level—A preconfigured indicator of the attack’s severity
level
• Action—The action that is taken when the attack is detected (routing
mode only). (See “Configuring IPS Actions (Routing Mode Only)” on
page 6-40.)
• ID—Identifies the vendor who created the signature; this value is
included in the log file when the attack is detected.
• Industry ID—Some signatures have a Common Vulnerabilities and
Exposures identifier (CVE ID), which is a unique identifier for pub-
licly known information security vulnerabilities.Signatures might
also have a Nessus plugin number or a Bugtraq ID.
• Enable—Select or clear the Enable check box or clear it, to enable or
disable a specific signature. See “Enable or Disable Signatures” on
page 6-39.