Managing Intrusion Policies
On the Intrusion Policy page () you can view your current custom intrusion policies, along with the following information:
-
the time and date the policy was last modified (in local time) and the user who modified it
-
whether the Drop when Inline setting is enabled, which allows you to drop and modify traffic in an inline deployment. An inline deployment could be configurations that are deployed to devices using routed, switched, or transparent interfaces, or inline interface pairs.
-
which access control policies and devices are using the intrusion policy to inspect traffic
-
whether a policy has unsaved changes, as well as information about who (if anyone) is currently editing the policy
Procedure
Step 1 | Choose . |
Step 2 | Manage your intrusion policy:
|