Skip to main content
Versa Networks

Configure Vulnerability Rules

Versa-logo-release-icon.pngFor supported software information, click here.

Vulnerability rules determines the level of protection against buffer overflows, illegal code execution, and other attempts to exploit system vulnerabilities. You can define rules separately for Director nodes and Versa Operating SystemTM (VOSTM) devices.

To configure vulnerability rules for a Director node:

  1. In Director view:
    1. Select the Configuration tab in the top menu bar.
    2. Select Templates > Device Templates in the horizontal menu bar.
    3. Select an organization in the left navigation panel.
    4. Select a template in the main pane. The view changes to Appliance view.
  2. Select the Configuration tab in the top menu bar.
  3. Select Objects & Connectors objects-connectors-icon.png > Objects > Custom Objects > Vulnerability Rules in the left menu bar. The main pane displays, with the Director tab selected.

    vulnerability-rules-dashboard-director-tab.png
  4. Click the upload.png Upload File icon. In the Upload Custom Vulnerability Rules File to Director, click Browse and select the file.

    uploadvulnerabilityrulesdirector.png
  5. Click OK.

Supported Software Information

Releases 20.2 and later support all content described in this article.