Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Exempt Rulebase Example: Exempting a Source Destination Pair

    Suppose in your security policy implementation there are schedule phases where your security team probes your internal network for vulnerabilities and you want the IDP Series device to generate logs, and phases where you have put your security policy in place and now want to exclude security team traffic from the generated logs. To support these alternative phases, you can create an Exempt rulebase rule and toggle it off and on.

    To create an Exempt rulebase rule:

    1. Create address objects that contain the security team IP addresses and the protected servers.
    2. Add the Exempt rulebase to your security policy.
    3. Add a rule that specifies the source/destination match condition to exempt.
    4. Add the All group of attack objects.

    Figure 1 shows an Exempt rulebase rule.

    Figure 1: Exempt Rulebase Rule

    Image s036672.gif

    To toggle the rule off, right-click it and select Disable.


    Published: 2011-02-08