Restrictions and guidelines

When you configure ND attack detection, follow these restrictions and guidelines: