[Contents]
[Prev]
[Next]
[Index]
[Report an Error]
J-Web Configuration
To define rules for an IPS rulebase:
- Create a policy by assigning a meaningful name
to it. The following tasks specify base-policy as the policy
name:
- Select Configuration>View and Edit>Edit
Configuration. The Configuration page appears.
- Next to Security, click Configure or Edit.
- Next to Idp, click Configure.
- Next to Idp policy, click Add new entry.
- In the Policy name box, type base-policy.
- Associate a rulebase with the policy and add rules
to the rulebase. The following tasks associate an IPS rulebase with base-policy and add rule R1 to the rulebase.
- Next to Rulebase ips, click Configure.
- Next to Rule, click Add new entry.
- In the Name box, type R1.
- Define the match criteria for the rule. The following
tasks specify that traffic from trust zone to untrust zone as match criteria for rule R1. The default application setting matches any application configured
in the attack object.
- Next to Match, click Configure.
- From the From zone list, select Enter specific value and type trust in the Zone box.
- From the To zone list, select Enter specific value and type untrust in the Zone box.
- From the Source list, select Source address.
- Next to Source address, click Add new entry.
- From the Value list, select Any and click OK.
- From the Destination list, select Destination address.
- Next to Destination address, click Add new entry.
- From the Value list, select Any and click OK.
- Next to Application, click Add new entry.
- From the Value list, select default and click OK.
- Define an attack as match criteria. The following
tasks specify predefined attack group Critical - TELNET as
match criteria for rule R1.
- On the Rule R1 page, next to Match, click Configure.
- Next to Attacks, click Configure.
- Next to Predefined attack groups, click Add new entry.
- In the Value box, type “Critical -
TELNET” and click OK.
- Specify an action for the rule. The following tasks
specify that the connection be dropped for any traffic that matches
the criteria defined for rule R1:
- On the Rule R1 page, next to Then, click Configure.
- Next to Action, click Configure.
- From the Action list, select Drop connection and
click OK.
- Specify notification and logging options for the
rule. The following tasks enable logging for this attack and specify
that an alert flag be added to the attack log:
- On the Rule R1 page, next to Then, click Configure.
- Next to Notification, select the check box and click Configure.
- Next to Log attacks, select the check box and click Configure.
- Next to Alert, select the check box and click OK.
- Set the severity level for the rule. The following
tasks set a critical severity level for rule R1:
- On the Rule R1 page, next to Then, select Configure or Edit.
- From the Severity list, select critical and click OK.
- Activate the policy. The following tasks specify base-policy as the active policy:
- On the Idp page, in the Active-policy box, type base-policy.
- Click OK.
- If you are finished configuring the device, commit
the configuration.
[Contents]
[Prev]
[Next]
[Index]
[Report an Error]