18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 20: IPS Attack and System Event Responses<br />

Creating IPS attack responses<br />

568<br />

Attack Description<br />

IPFilter deny Detects when a connection is denied by the active IP Filter<br />

policy.<br />

keyword filter<br />

failure<br />

Detects when an SMTP mail message is rejected due to a<br />

configured keyword filter.<br />

mime virus Detects when a connection is rejected due to the MIME or<br />

Anti-virus policy.<br />

network probe Detects network probe attacks, which occur any time a<br />

user attempts to connect or send a message to a TCP or<br />

UDP port that has no service.<br />

policy violation all Detects attacks <strong>of</strong> all severities that violate the active<br />

policy. This attack category also detects all severities <strong>of</strong><br />

failed authentication attacks, network probe attacks, ACL<br />

and IP Filter deny attacks, and Type Enforcement error<br />

attacks.<br />

policy violation<br />

severe<br />

protocol violation<br />

all<br />

protocol violation<br />

severe<br />

Detects severe attacks that violate the active policy. This<br />

attack category also detects failed authentication attacks,<br />

network probe attacks, ACL and IP Filter deny attacks, and<br />

Type Enforcement error attacks. Severe attacks indicate<br />

something is occurring that an administrator should know.<br />

Detects attacks <strong>of</strong> all severities that violate protocol<br />

compliance.<br />

Detects severe attacks that violate proxy protocols (HTTP,<br />

Telnet, FTP, etc.). Severe attacks indicate something is<br />

occurring that an administrator should know.<br />

proxy flood Detects potential connection attack attempts. A connection<br />

attack is defined as one or more addresses launching<br />

numerous proxy connection attempts to try and flood the<br />

system. When NSS receives more connection attempts<br />

than it can handle for a proxy, new connections to that<br />

proxy are briefly delayed (to allow the proxy to “catch up”),<br />

and the attack is audited.<br />

spam filter failure Detects when an SMTP mail message is classified as<br />

spam by the spam filtering policy.<br />

TCP SYN attack Detects a possible attempt to overrun the <strong>Sidewinder</strong> <strong>G2</strong><br />

with connection attempts.<br />

Type Enforcement Detects when there is a TE violation due to an<br />

unauthorized user or process attempting to perform an<br />

illegal operation.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!