18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 7: Configuring Network Defenses<br />

Viewing Network Defense information<br />

Viewing Network<br />

Defense<br />

information<br />

208<br />

Network Defenses allow you to control the audit output for suspicious traffic<br />

detected by <strong>Sidewinder</strong> <strong>G2</strong>, automatically preventing that traffic from passing<br />

from one burb to another. Some traffic is stopped because a packet, or<br />

sequence <strong>of</strong> packets, resembles a known attack. Other traffic is stopped<br />

because a packet does not comply with its protocol’s standards.<br />

Options for what audit to generate include:<br />

• Audit for packets that <strong>Sidewinder</strong> <strong>G2</strong> determines to be part <strong>of</strong> an identifiable<br />

attack can be audited based on attack description (bad header length, bad<br />

redirect, etc.).<br />

• Audit for packets that are not specifically identified as a potential attack can<br />

be audited at the following levels:<br />

– All packets that do not comply with their protocol’s standards<br />

– Packets that do not comply with their protocol’s standards and have<br />

been identified as a severe or moderate risk to your network<br />

– Packets that do not comply with their protocol’s standards and have<br />

been identified as a severe risk to your network<br />

– Do not generate audit when <strong>Sidewinder</strong> <strong>G2</strong> stops a packet because it<br />

does not comply to its protocol’s standard<br />

Network Defenses represent one element <strong>of</strong> <strong>Sidewinder</strong> <strong>G2</strong>’s audit<br />

capabilities. Information about additional auditing tools can be found in the<br />

following chapters:<br />

• Chapter 18, "Monitoring"<br />

• Chapter 19, "Auditing and Reporting"<br />

• Chapter 20, "IPS Attack and System Event Responses"

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!