IDP Policies Configuration Page Options

  1. Select Configure>Security>Policy>Define IDP Policy.

    The IDP Policy configuration page appears. Table 42 explains the contents of this page.

  2. Click the following:
    • Template—Downloads, installs, and loads a template. Enter information as specified in Table 43.
  3. Click the following:
    • Check Status—Checks download or install status. Enter information as specified in Table 44.
  4. Click one:
    • Add—Adds a new or duplicate IDP policy configuration. Enter information as specified in Table 45.
    • Edit—Edits the selected IDP policy configuration.
    • Delete—Deletes the selected IDP policy configuration.
  5. Click the following:
    • Clone—Clones or copies a policy. Select a record in the Policy List. Enter information as specified in Table 46.
  6. Click Activate to validate and activate the configuration.
  7. Click one:
    • OK—Saves the configuration and returns to the main configuration page.
    • Commit Options>Commit—Commits the configuration and returns to the main configuration page.
    • Cancel—Cancels your entries and returns to the main configuration page.

Table 42: IDP Policy Configuration Page

Field

Function

Policy List

Status

Displays the status of the policy.

Name

Displays the IDP policy name.

Type

Displays the IDP policy type.

IPS Rule Number

Displays the number of rule based IP profiles that are configured.

Exempt Rule Number

Displays the number of rule based exempt profiles that are configured.

Table 43: Template Details

Field FunctionAction

Template

Loads a predefined IDP template. The options available are:

  • Download Template—Downloads a template from the server.
  • Install Template—Installs the template to the router.
  • Load Template—Loads the predefined policies to the policy list.

Click Template and select an option.

Table 44: Check Status Details

Field FunctionAction

Check Status

Checks download or install status. The options available are:

  • Download Status—Downloads status information from the Check Status list.
  • Install Status—Installs status information from the Check Status list.

Click Check Status and select an option.

Table 45: Add IDP Policy Configuration Details

Field FunctionAction

Policy Name

Specifies the name of the IDP policy.

Enter a policy name.

Activate

Specifies whether or not the configured IDP policy is set as the active policy.

Select the check box.

IPS Rule

Specifies the IPS rule created. The options available are:

  • Add—Adds a new IPS rule.
  • Edit—Edits the selected IPS rule.
  • Delete—Deletes the selected record.
  • Move—Organize rows. Select Move up, Move down, Move to top, or Move to down.

Select an option.

Basic

Policy Name

Specifies the name of the IDP policy.

Displays the name of the IDP policy.

Rule Name

Specifies the name of the IPS rulebase rule.

Enter a rule name.

Rule Description

Specifies a description for the rule.

Enter the description for the rule.

Action

Specifies the list of all the rule actions for IDP to take when the monitored traffic matches the attack objects specified in the rules.

Select a rule action from the list.

Application

Specifies the list of one or multiple configured applications.

Select the applications to be matched.

Attack Type

Specifies the attack type that you do not want the device to match in the monitored network traffic. The options available are:

  • Predefined Attacks
  • Predefined Attack Groups

Select an option from the list and click the right arrow to match an attack object or attack group to the rule.

Category

Specifies the category used for scrutinizing rules of sets.

Select a category from the list.

Severity

Specifies the rule severity levels in logging to support better organization and presentation of log records on the log server.

Select a severity level from the list.

Direction

Specifies the direction of network traffic you want the device to monitor for attacks.

Select a direction level from the list.

Matched

Specifies the type of network traffic you want the device to monitor for attacks.

Select the traffic type and click the right arrow to move it to the matched list.

Advanced

IP Action

Specifies the action that IDP takes against future connections that use the same IP address.

Select an IP action from the list.

IP Target

Specifies the destination IP address.

Select an IP target from the list.

Timeout

Specifies the number of seconds the IP action should remain effective before new sessions are initiated within that specified timeout value.

Enter the timeout value, in seconds. The maximum value is 65,535 seconds.

Log IP Action

Specifies whether or not the log attacks are enabled to create a log record that appears in the log viewer.

Select the check box.

Enable Attack Logging

Specifies whether or not the configuring attack logging alert is enabled.

Select the check box.

Set Alert Flag

Specifies whether or not an alert flag is set.

Select the check box.

Severity

Specifies the rule severity level.

Select an option from the list.

Terminal

Specifies whether or not the terminal rule flag is set.

Select the check box.

Match

From Zone

Specifies the match criteria for the source zone for each rule.

Select the match criteria from the list.

To Zone

Specifies the match criteria for the destination zone for each rule.

Select the match criteria from the list.

Source Address

Specifies the zone exceptions for the from-zone and source address for each rule. The options available are:

  • Match—Matches the from-zone and source address/address sets to the rule.
  • Except—Enables the exception criteria.

Select the from-zone and source addresses/address sets from the list and do one of the following:

  • Click Match and the click the right arrow.
  • Click Except.

Destination Address

Specifies the zone exceptions for the to-zone and destination address for each rule. The options available are:

  • Match—Matches the from-zone and destination address/address sets to the rule.
  • Except—Enables the exception criteria.

Select the to-zone and destination addresses/address sets from the list and do one of the following:

  • Click Match and then click the right arrow.
  • Click Except.

Table 46: Clone Details

Field FunctionAction

Copy Policy

Displays the policy name that was created.

New Policy

Specifies the new policy name.

Enter a new policy name.

Related Documentation