TMS zl Management and Configuration Guide ST.1.2.100916

6-32
Intrusion Detection and Prevention
Configure IDS/IPS
Figure 6-9. Intrusion Prevention > Signatures > View Window
The Intrusion Prevention (Detection) > Signatures > View windows lists the
following information about each signature:
Name—Name of the attack, usually an industry-standard name
Threat LevelA preconfigured indicator of the attack’s severity level
Protection—The type of device the associated attack targets. This
column displays one of the following values:
ClientThe signature detects attacks that target clients.
Server—The signature detects attacks that target servers.
Client & Server—The signature detects attacks that target both
clients and servers.
Action—Displays the action that is taken when the attack is detected
(routing mode only). See “Configure IPS Actions (Routing Mode
Only)” on page 6-35.
ID—Identifies the vendor who created the signature; this value is
included in the log file when the attack is detected.
Industry ID—Some signatures have a Common Vulnerabilities and
Exposures identifier (CVE ID), which is a unique identifier for pub-
licly known information security vulnerabilities.Signatures might
also have a Nessus plugin number or a Bugtraq ID.