TMS zl Management and Configuration Guide ST.1.2.100916
6-32
Intrusion Detection and Prevention
Configure IDS/IPS
Figure 6-9. Intrusion Prevention > Signatures > View Window
The Intrusion Prevention (Detection) > Signatures > View windows lists the
following information about each signature:
• Name—Name of the attack, usually an industry-standard name
• Threat Level—A preconfigured indicator of the attack’s severity level
• Protection—The type of device the associated attack targets. This
column displays one of the following values:
– Client—The signature detects attacks that target clients.
– Server—The signature detects attacks that target servers.
– Client & Server—The signature detects attacks that target both
clients and servers.
• Action—Displays the action that is taken when the attack is detected
(routing mode only). See “Configure IPS Actions (Routing Mode
Only)” on page 6-35.
• ID—Identifies the vendor who created the signature; this value is
included in the log file when the attack is detected.
• Industry ID—Some signatures have a Common Vulnerabilities and
Exposures identifier (CVE ID), which is a unique identifier for pub-
licly known information security vulnerabilities.Signatures might
also have a Nessus plugin number or a Bugtraq ID.