PacketViper User's Guide - Version 5
The v5 User's Guide contains how-to information on configuration and policy creation scenarios as well as usage details to
customize your PacketViper solution.
Published: September 13, 2019
PacketViper Deployment Guide - Version 5
The Deployment Guide contains how-to information on the non-appliance installation options to deploy your PacketViper solution to fit your needs. Published: September 13, 2019
Custom Rules: Purpose of Interception Rules
Within the Custom Rules, you can create rules that intercept specific types of connections. In addition craft a custom message for the source which matches the custom rules. In order for the interception to function properly, an IP address must be ...
Send PacketViper logs to 3rd party Event Manager
PacketViper can be configured to forward its logs to any 3rd party event manager via SYSLOG. This is useful should the customer wish to integrated PacketViper logging into a current solution for long term storage or leverage existing alerting and ...
Some Common High-Risk Ports
In PacketViper we will often use deception and dynamic perimeter technology to trap, observe, alert, and respond to certain patterns of traffic. One of the most invaluable tools in that sort of pattern analysis is the target or destination port that ...