The Vulnerability Protection profile on the firewall includes
signatures to protect you from brute force attacks. Each signature
has an ID, Threat Name, and Severity and is triggered when a pattern
is recorded. The pattern specifies the conditions and interval at
which the traffic is identified as a brute-force attack; some signatures
are associated with another child signature that is of a lower severity
and specifies the pattern to match against. When a pattern matches
against the signature or child signature, it triggers the default
action for the signature.