User`s manual

Content Security Gateway User’s Manual
- 182 -
Internal Alerts Settings
The threshold sessions of infected Blaster (per Source IP) is
Sessions /Sec: You
can set the threshold sessions for the IP who had infected Blaster worm. When the sessions
exceed the threshold, CS-500 will block the connection.
Enable Blaster Blocking: Select this option to enable the blaster blocking function. Once
the blaster worm is detected, it will block the TCP port 135 for user-drefined blocking time.
Enable E-mail Alert Notification: When Blaster worm is detected, send alert e-mail to
administrator by using e-mail address defined on System -> Configure -> Setting.
Enalbe SNMP Trap Alert Notification: When Blaster worm is detected, send SNMP trap to
user-defined SNMP trap receiver IP address defined on System -> SNMP.
Enable NetBIOS Alert Notification: When Blaster worm is detected, send alart message
to administrator by using “Net send” command.
After enabling the needed options, click OK to activate the changes.
4.6.1.2 External Alert
The Administrator can enable the device’s auto detect functions for hacker attacking this section. When
abnormal conditions occur, the Content Security Gateway will send an e-mail alert to notify the Administrator,
and also display warning messages in the External Alarm window.