18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Attack Description<br />

Chapter 19: Auditing and Reporting<br />

Auditing on the <strong>Sidewinder</strong> <strong>G2</strong><br />

policy violation all Detects attacks <strong>of</strong> all severities that violate the active<br />

policy. This attack category also detects all severities <strong>of</strong><br />

failed authentication attacks, ACL and IP Filter deny<br />

attacks, and Type Enforcement error attacks.<br />

policy violation<br />

severe<br />

Detects severe attacks that violate the active policy. This<br />

attack category also detects failed authentication attacks,<br />

ACL and IP Filter deny attacks, and Type Enforcement<br />

error attacks. Severe attacks indicate something is<br />

occurring that an administrator should know.<br />

power failure Detects when an Uninterruptible Power Supply (UPS)<br />

device detects a power failure and the <strong>Sidewinder</strong> <strong>G2</strong> is<br />

running on UPS battery power.<br />

protocol violation<br />

all<br />

protocol violation<br />

severe<br />

Detects attacks <strong>of</strong> all severities that violate protocol<br />

compliance.<br />

Detects severe attacks that violate proxy protocols (HTTP,<br />

Telnet, FTP, etc.). Severe attacks indicate something is<br />

occurring that an administrator should know.<br />

proxy flood Detects potential connection attack attempts. A connection<br />

attack is defined as one or more addresses launching<br />

numerous proxy connection attempts to try and flood the<br />

system. When NSS receives more connection attempts<br />

than it can handle for a proxy, new connections to that<br />

proxy are briefly delayed (to allow the proxy to “catch up”),<br />

and the attack is audited.<br />

spam filter failure Detects when an SMTP mail message is classified as<br />

spam by the spam filtering policy.<br />

syslog Detects all audit attacks and system events created via<br />

syslog.<br />

system all Detects all system events <strong>of</strong> all severities, including power<br />

failures, hardware and s<strong>of</strong>tware failures, failover events,<br />

license expiration, host license exceeded, log overflows,<br />

and IPSEC errors.<br />

system critical Detects all critical system events, including power failures,<br />

hardware failures, critical s<strong>of</strong>tware failures, and failover<br />

events. Critical system events indicate a component or<br />

subsystem stopped working, that the system is going down<br />

(expectedly or unexpectedly), or that the system is not<br />

expected to work again without intervention.<br />

More...<br />

543

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!