About the intrusion system

Note: To view this option, you need a Unified Threat Management license.

The Intrusion System performs real-time packet analysis on all network traffic to detect and prevent malicious network activity. The Smoothwall can detect a vast array of well-known service exploits including buffer overflow attempts, port scans and CGI attacks.

All violations are logged, and the logged data can be used to strengthen the Smoothwall Firewall by creating IP block rules against identified networks and source IPs.

Customized and automatic rules in the intrusion detection and intrusion prevention systems. Configure Smoothwall’s intrusion detection and prevention rules for inclusion in IDS and IPS policies. Turn on and configure policies to monitor network activity using the Intrusion Detection System (IDS). Turn on and configure policies to monitor network activity using the Intrusion Prevention System (IDS).

Default intrusion policies

The Smoothwall comes with several intrusion policies by default, which you can deploy immediately. The default policies will change as emerging threats change and is updated regularly.

For a detailed description of how to edit the default policies, see the help topic, Creating custom intrusion policies.

Read more

About intrusion system signatures

About custom intrusion policies

About intrusion detection system policies

About intrusion prevention system policies

Something not right? .