TMS zl Management and Configuration Guide ST.1.1.100430
6-36
Intrusion Detection and Prevention
Configure IDS/IPS
Figure 6-14. Intrusion Protection > Settings > Actions Window
2. Select the Enable Signature and Protocol Anomaly detection check box.
Note When signature and protocol anomaly detection is enabled, a log entry is
generated for each instance in which suspect packets or traffic is found,
regardless of the Action setting.
3. For each threat severity level, select the actions that you want the TMS zl
Module to take.
4. Click Apply My Changes.
5. Click Save.