Note: This topic applies to the Hearst Release.
Note: A Unified Threat Management serial is required use the Intrusion System. For more information, contact your Smoothwall representative.
The Intrusion System performs real-time packet analysis on all network traffic in order to detect and prevent malicious network activity. The Smoothwall can detect a vast array of well-known service exploits including buffer overflow attempts, port scans and CGI attacks.
All violations are logged and the logged data can be used to strengthen the firewall by creating IP block rules against identified networks and source IPs.
By default, the Smoothwall comes with a number of intrusion policies which you can deploy immediately. The default policies will change as emerging threats change and will be updated regularly.
For more information about the default policies, go to Services > Intrusion system > Policies, and scroll down to the Current Policies table.
For a detailed description of how to edit the default policies, see Creating Custom Intrusion Policies.