Chapter 34 IDP
ZyWALL USG 300 User’s Guide
619
You can activate the signature, configure what action to take when a packet
matches it and if it should generate a log or alert in a profile. Then bind the profile
to a zone.
Figure 440 Example: Custom Signature in IDP Profile
34.8.4 Verifying Custom Signatures
Configure the signature to create a log when traffic matches the signature. (You
may also want to configure an alert if it is for a serious attack and needs
immediate attention.) After you apply the signature to a zone, you can see if it
works by checking the logs (Monitor > Log).
The Priority column shows warn for signatures that are configured to generate a
log only. It shows critical for signatures that are configured to generate a log and
alert. All IDP signatures come under the IDP category. The Note column displays
ACCESS FORWARD when no action is configured for the signature. It displays
ACCESS DENIED if you configure the signature action to drop the packet. The