The exempt rulebase works in conjunction with the IPS rulebase. Before you can create exempt rules, you must first create rules in the IPS rulebase. If traffic matches a rule in the IPS rulebase, IDP attempts to match the traffic against the exempt rulebase before performing the specified action or creating a log record for the event. If IDP detects traffic that matches the source/destination pair and the attack objects specified in the exempt rulebase, it automatically exempts that traffic from attack detection.
Configure an exempt rulebase in the following conditions:
|
Before You Begin |
|---|
|
When you create an exempt rule, you must specify the following:
In this configuration example, you consistently find that your IDP policy generates false positives for the attack FTP:USER:ROOT on your internal network. You configure the rule to exempt attack detection for this attack when the source IP is from your internal network.
You can use either J-Web or the CLI configuration editor to configure an application set.
This topic contains: