Created on 11-09-2007 12:00 AM
Description | IPS anomaly thresholds. | ||||||||||||||||||||||||
Components |
| ||||||||||||||||||||||||
Steps or Commands | Some Anomaly attacks have a threshold associated with it. The administrator can fine-tune anomaly settings by giving different thresholds for different connections based on source subnet, destination subnet and service (destination port) of the connection. Multiple entries can be configured to one anomaly. For any new connection, the threshold of the best-match entry is applied. To configure the anomaly threshold, use the following CLI command as an example: config ips anomaly syn_flood The table below includes the anomalies and their units for each threshold.
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.