Advanced Protection
In this chapter, we will learn about advanced configuration features, such as custom applications and custom threats, and apply them to a policy, and we will review how zone protection and Denial of Service (DoS) protection can defend the network and individual resources from attackers.
In this chapter, we’re going to cover the following main topics:
- Custom applications and application override
- Custom threat signatures
- Zone protection and DoS protection
In the following chapter we will learn how to create custom applications to identify internally created protocols or applications that do not match, or match a generic App-ID. We will also learn how to create our own threat signatures so we can block certain payloads. Lastly we’ll see how we can defend the firewall and backend systems from all sorts of packet-based attacks.