To add an exempt rulebase :
Table 160: Add an Exempt Rulebase Configuration Details
Field |
Function |
Actions |
---|---|---|
Basic | ||
Policy Name |
Specifies the name of the IDP Policy. |
|
Rule Name |
Specifies the name of the exempt rulebase rule. |
Type a rule name |
Rule Description |
Specifies the description for the rule. |
Type the description for the rule. |
Attack Type |
Specifies predefined or custom attack objects or attack groups that are used to match the traffic against known attacks. |
Select the attack or attack group from the list and do one of the following:
|
Category |
Specifies the category used for scrutinizing rules to sets. |
Select a category from the list. |
Severity |
Specifies the rule severity levels in logging to support better organization and presentation of log records on the log server. |
Select a severity level from the list. |
Direction |
Specifies the direction of network traffic you want the device to monitor for attacks. |
Select a direction level from the list. |
Matched |
Specifies the type of network traffic you want the device to monitor for attacks. |
Select the traffic types and click the right arrow to move them to the matched list. |
Match | ||
From Zone |
Specifies the match criteria for the source zone for each rule. |
Select the match criteria from the list. |
To Zone |
Specifies the match criteria for the destination zone for each rule. |
Select the match criteria from the list. |
Source Address |
Specifies the zone exceptions for the from-zone and source address for each rule. |
Select the from-zone and source addresses/address sets from the list and do one of the following:
|
Destination Address |
Specifies the zone exceptions for the to-zone and destination address for each rule. |
Select the to-zone and destination addresses/address sets from the list and do one of the following:
|