www.gfi.com
4 Settings
|
230
5.
Click
Advanced
.
6.
In the
Advanced Intrusion Prevention Settings
dialog, click
Add
.
7.
Paste the rule ID number and a description.
8.
Click
OK
and
Apply
.
The legitimate traffic is allowed now.
Configuring protocol-specific intrusions
Some intrusions may target security weaknesses in specific application protocols. Therefore, some security rules are
focused on special protocols on standard and frequently used ports.
If an application is available from the Internet and uses any of the listed protocols on a non-standard port (for example,
HTTP on port 10000), add this port to list of ports on which protocol-specific intrusions are detected:
1.
In the administration interface, go to
Do'stlaringiz bilan baham: