[Contents]
[Prev]
[Next]
[Index]
[Report an Error]
Display Options
For monitoring purposes, you can:
- Display all suspicious control flows when the system has
recognized an attack.
- Display the current state and the number of transitions
into suspicious state for the protocol and priority.
- Display historical counts about the number of flows made
suspicious.
- View a trap or log generated when a control flow is considered
suspicious.
- View a trap or log generated when a control flow is no
longer suspicious.
[Contents]
[Prev]
[Next]
[Index]
[Report an Error]