[Contents] [Prev] [Next] [Index] [Report an Error]


Usage

<configuration>
    <security>
        <idp>
            <custom-attack>
                <name>name</name> <!-- identifier -->
                <recommended-action>recommended-action-choice</recommended-action>
                <severity>severity-choice</severity>
                <time-binding>...</time-binding>
                <attack-type>...</attack-type>
            </custom-attack>
        </idp>
    </security>
</configuration>

Description

Configure custom attacks.

Contents

<attack-type>—Type of attack.

<name>—Custom attack name.

<recommended-action>—Recommended Action.

<severity>—Select the severity that matches the lethality of this attack on your network.

<time-binding>—Time binding params.


[Contents] [Prev] [Next] [Index] [Report an Error]