TMS zl Management and Configuration Guide ST.1.2.100916
6-33
Intrusion Detection and Prevention
Configure IDS/IPS
• Enable—Select or clear the Enable check box or clear it, to enable or
disable a specific signature. See “Enable or Disable Signatures” on
page 6-34.
2. To find out more about a particular signature, click the name (which is
underlined). A pop-up box is displayed, providing information about the
signature’s capabilities.
Figure 6-10. Additional Information about a Signature
Click OK to close the information box.
3. Use filters to view a subset of signatures:
• Status—Select Any to view all signatures, Enabled to view only enabled
signatures, or Disabled to view only disabled signatures.
• Protection—Select one of the following:
– Server to view only the signatures that detect attacks targeting
servers
– Client to view only the signatures that detect attacks targeting
clients
– Client & Server to view only the signatures that detect attacks
targeting both servers and clients
– Any to view all three types of signatures—those that detect
attacks targeting servers, those that detect attacks targeting cli-
ents, and those that detect attacks targeting both clients and
servers
Figure 6-11 shows the differences among these filters: