TMS zl Management and Configuration Guide ST.1.2.100916
6-20
Intrusion Detection and Prevention
Configure IDS/IPS
■ Backdoor
• Acid Battery
• Meet the Lamer
• Back Orifice
•AOL Admin
•Alvgus
•Ruler
Configure IDS/IPS
When you use the TMS zl Module as an IDS (required for monitor mode), you
can configure:
■ Protocol anomaly detection settings
■ Port maps
■ IDS signatures that are used to perform checks
■ Session inspection
When you use the TMS zl Module as an IPS, you can configure:
■ Protocol anomaly detection settings
■ Port maps
■ IPS signatures that are used to perform checks
■ Action that the TMS zl Module takes if threats are detected
■ Session inspection
Configure Protocol Anomaly Detection
The TMS zl Module provides default settings for performing anomaly detec-
tion. You can modify these default settings as needed for your environment,
but before making such changes, you should consult the documentation for
your company’s servers to identify their limitations and capacities.