TMS zl Management and Configuration Guide ST.1.0.090213
6-42
Intrusion Detection and Prevention
Configuring IDS/IPS
Note When signature and protocol anomaly detection is enabled, a log entry is
generated for each instance in which suspect packets or traffic is found,
regardless of the Action setting.
3. For each threat severity level, select the actions that you want the TMS zl
Module to take.
4. Click Apply My Changes.
5. Click Save.