To add an IPS rulebase:
Table 169: Add an IPS Rulebase Page Details
Field |
Function |
Action |
---|---|---|
Basic | ||
Policy Name |
Specifies the name of the IDP policy. |
Displays the name of the IDP policy. |
Rule Name |
Specifies the name of the IPS rulebase rule. |
Type a rule name. |
Rule Description |
Specifies the description for the rule. |
Type the description for the rule. |
Action |
Lists all the rule actions for IDP to take when the monitored traffic matches the attack objects specified in the rules. |
Select a rule action from the list. |
Application |
Lists one or multiple configured applications. |
Select the applications to be matched. |
Attack Type |
Specifies the attack type that you do not want the device to match in the monitored network traffic. The attack types available are :
|
Select the attack object or attack group from the list and do one of the following:
|
Category |
Specifies the category used for scrutinizing rules to sets. |
Select a category from the list. |
Severity |
Specifies the rule severity levels in logging to support better organization and presentation of log records on the log server. |
Select a severity level from the list. |
Direction |
Specifies the direction of network traffic you want the device to monitor for attacks. |
Select a direction level from the list. |
Matched |
Specifies the type of network traffic you want the device to monitor for attacks. |
Select the traffic types and click the right arrow to move them to the matched list. |
Advanced | ||
IP Action |
Specifies the action IDP takes against future connections that use the same IP address. |
Select an IP action from the list. |
IP Target |
Specifies the destination IP address. |
Select an IP target from the list. |
Timeout |
Specifies the number of seconds the IP action should remain effective before new sessions are initiated within that specified timeout value. |
Type the timeout value, in seconds. Maximum acceptable value is 65,535 seconds. |
Log IP Action |
Specifies if the log attacks are enabled to create a log record that appears in the log viewer. |
Select the check box. |
Enable Attack Logging |
Specifies if the configuring attack logging alert is enabled. |
Select the check box. |
Set Alert Flag |
Specifies if an alert flag is set. |
Select the check box. |
Terminal |
Specifies if the terminal rule flag is set or unset. |
Select the check box. |
Match | ||
From Zone |
Specifies the match criteria for the source zone for each rule. |
Select the match criteria from the list. |
To Zone |
Specifies the match criteria for the destination zone for each rule. |
Select the match criteria from the list. |
Source Address |
Specifies the zone exceptions for the from-zone and source address for each rule. |
Select the from-zone and source addresses/address sets from the list and do one of the following:
|
Destination Address |
Specifies the zone exceptions for the to-zone and destination address for each rule. |
Select the to-zone and destination addresses/address sets from the list and do one of the following:
|