Applies To:

Show Versions Show Versions

Manual Chapter: Security Profile Violations
Manual Chapter
Table of Contents   |   << Previous Chapter

Security profile violations (or just violations) occur when the Protocol Security Module detects that some part of the related traffic does not comply with the defense configuration in a security profile. For detailed information on the security profiles themselves, refer to the appropriate chapter in this book (Chapters 2, 3, and 4). This appendix provides descriptions of the possible violations for each traffic type.
Table A.1 lists the possible FTP security violations, and describes the event that triggers the violation.
The number of logon attempts, either from a specific user name, or a specific host IP address, exceeds the maximum number specified in the security profile.
Table A.2 lists the HTTP security violations, and describes the event that triggers the violation.
The incoming request references a file type that is either not configured in the allowed file types list, or configured in the disallowed file types list, of the security profile.
The incoming request references an HTTP request method that either is not configured in the allowed methods list, or is configured in the disallowed methods list, of the security profile.
Table A.3 lists the SMTP security violations, and describes the event that triggers the violation.
The client SMTP transaction contains an IP address or domain name that has neither an associated MX record nor an A record in the Domain Name Service (DNS).
The number of SMTP transactions for non-existent recipients exceeds the transactions per minute rate that is specified in the security profile.
A client sends the same message to the same recipient multiple times within the hold period that is specified in the security profile. If, after being rejected the first time, another message comes in within the specified hold period, it is also rejected.
Table of Contents   |   << Previous Chapter

Was this resource helpful in solving your issue?




NOTE: Please do not provide personal information.



Incorrect answer. Please try again: Please enter the words to the right: Please enter the numbers you hear:

Additional Comments (optional)