Intrusion detection tab

On the Intrusion detection tab (see the figure below), you can manage sets of Intrusion Detection rules and additional Intrusion Detection methods.

Intrusion detection tab

Intrusion detection tab

Above the table containing the sets of Intrusion Detection rules, a toolbar provides the following management elements and data fields:

The table containing the sets of Intrusion Detection rules is located in the main part of the tab. The table columns display the following information about sets of rules:

The lower part of the Intrusion detection tab contains buttons for canceling and applying changes to the state of sets of rules (in the Active column).

Page top