Applies To:

Show Versions Show Versions

Manual Chapter: Security Profile Violations
Manual Chapter
Table of Contents   |   << Previous Chapter

Security profile violations (or just violations) occur when the Protocol Security Module detects that some part of the related traffic does not comply with the defense configuration in a security profile. For detailed information on the security profiles themselves, refer to the appropriate chapter in this book. This appendix provides only descriptions of the possible violations for each traffic type.
Table A.1 lists the possible FTP security violations and describes the event that triggers the violation.
The number of login attempts, either from a specific user name, or a specific host IP address, exceeds the maximum number specified in the security profile.
Table A.2 lists the HTTP security violations and describes the event that triggers the violation.
The incoming request references an object type that is either not configured in the allowed object types list, or configured in the disallowed object types list, of the security profile.
Table A.3 lists the SMTP security violations and describes the event that triggers the violation.
In a Domain Name Service (DNS) reverse lookup that uses the client domain name, the client IP address resolves to a domain name that is configured as a disallowed sender in the security profile. If you have configured IP addresses in the disallowed senders list, then the Security Enforcer just compares the client IP address to the list.
The client SMTP transaction contains an IP address or domain name that does not have an official entry in the Domain Name Service (DNS).
The number of SMTP transactions for non-existent recipients exceeds the transactions per minute rate that is specified in the security profile.
A client sends the same message to the same recipient multiple times within the hold period that is specified in the security profile.
Table of Contents   |   << Previous Chapter

Was this resource helpful in solving your issue?




NOTE: Please do not provide personal information.



Incorrect answer. Please try again: Please enter the words to the right: Please enter the numbers you hear:

Additional Comments (optional)