Configuring Backdoor Rulebase Rules (NSM Procedure)
The backdoor rulebase detects if there exists any interactive traffic introduced during backdoor attacks.
To configure a backdoor rulebase rule:
- In the NSM navigation tree, select Policy Manager > Security Policies.
- Select and double-click the security policy to which you want to add the backdoor rulebase rule.
- Click New in the upper right corner of the policy viewer and select Add Backdoor Rulebase.
- Click the New button within the rules viewer to add a rule.
- Modify the property of the rule by right-clicking the table cell for the property and making your modifications.
- Configure or modify the rule using the settings described in Table 30.
Table 30: Backdoor Rulebase Rule Properties
Option | Function | Your Action |
---|---|---|
No | Specifies if you want to add, delete, copy, or reorder rules. | Right-click the table cell for the rule number and make your required modifications. |
Match > Source | Specifies the address object that is the source of the traffic. | Select any to monitor network traffic originating from any IP address. Note: You can also negate one or more address objects to specify all sources except the excluded object. |
Match > Destination | Specifies the address object that is the destination of the traffic, typically a server or other device on your network. | Select the destination object. Note: You can also negate one or more address objects to specify all destinations except the excluded object. |
Match > Service | Specifies service objects in rules to service an attack to access your network. | Set a service by selecting any of the following options:
|
Operation | Specifies whether to detect or ignore the backdoor traffic. | Select either Detect or Ignore. |
Action | Specifies an action of the IDP to detect any interactive traffic. | Select any type of action. |
Notification | Allows you to create log records with attack information that you can view real-time in the Log Viewer. | Select Configure to create log records. |
VLAN Tag | Specifies that you can configure a rule to only apply to messages in certain VLANs. | Set a value by selecting any of the following options:
|
Severity | Specifies if you can override the inherent attack severity on a per-rule basis within the IDP rulebase. | Set the severity to Default, Info, Warning, Minor, Major, or Critical. Note: This column only appears when you view the Security Policy in Expanded Mode. |
Install On | Specifies the security devices or templates that receive and use this rule. | Select the target security device. Note: You can also select multiple security devices on which to install the rule. |
Comments | Specifies any miscellaneous comment about the rule's purpose. | Enter any additional comments about the rule. |
For more information, see the IDP Concepts & Examples guide.