TMS zl Management and Configuration Guide ST.1.0.090213

6-38
Intrusion Detection and Prevention
Configuring IDS/IPS
Figure 6-25. Intrusion Prevention > Signatures > View Window
The Intrusion Prevention (Detection) > Signatures > View windows lists the
following information about each signature:
Name—Name of the attack, usually an industry-standard name
Threat Level—A preconfigured indicator of the attack’s severity
level
Action—The action that is taken when the attack is detected (routing
mode only). (See “Configuring IPS Actions (Routing Mode Only)” on
page 6-40.)
ID—Identifies the vendor who created the signature; this value is
included in the log file when the attack is detected.
Industry ID—Some signatures have a Common Vulnerabilities and
Exposures identifier (CVE ID), which is a unique identifier for pub-
licly known information security vulnerabilities.Signatures might
also have a Nessus plugin number or a Bugtraq ID.
Enable—Select or clear the Enable check box or clear it, to enable or
disable a specific signature. See “Enable or Disable Signatures” on
page 6-39.