Policy Name
|
Specifies the name of the IDP policy.
|
Displays the name of the IDP policy.
|
Rulebase
|
Specifies IPS rule to create, modify, delete, and reorder the
rules in a rulebase.
|
Displays the name of the rulebase.
|
Configure
Rule Name and Description |
Rule Name
|
Specifies the name of the IPS rulebase rule.
|
Type a rule name.
|
Description
|
Specifies the description for the rule.
|
Type the description for the rule.
|
Rule Match
Criteria |
From-Zone
and Source Addresses/Address Sets |
Match
|
Specifies the match criteria for the source zone for each rule.
|
Click the option button to enable the match criteria.
|
Source Address Book
|
Lists all the from-zone and source addresses/address sets for
the policy.
|
Select the from-zone and source addresses/address sets from
the list and do one of the following:
- To match the from-zone and source address/address sets
to the rule, click the left arrow.
- To remove the rule match for the from-zone exceptions
for each rule, click the right arrow.
|
Except
|
Specifies the zone exceptions for the from-zone and source address
for each rule.
|
Click the option button to enable the exception criteria.
|
To-Zone and
Destination Addresses/Address Sets |
Match
|
Specifies the match criteria for the to-zone and source addresses
for each rule.
|
Click the option button to enable the match criteria.
|
Destination Address Book
|
Lists all the to-zone and destination addresses/address sets
for the policy.
|
Select the to-zone and destination addresses/address sets from
the list and do either one of the following:
- To match the to-zone and destination addresses/address
sets to the rule, click the left arrow.
- To remove the rule match for the to-zone exceptions for
each rule, click the right arrow.
|
Except
|
Specifies the except criteria for the to-zone and source address
for each rule.
|
Click the option button to enable exception criteria.
|
Attacks |
Predefined Attacks
|
Specifies predefined attack objects that are used to match the
traffic against known attacks.
|
Type a valid predefined attack name and do either one the following:
- To add a predefined attack, type it next to the Add button, and click Add.
- To remove a predefined attack, select it in the Predefined
Attacks box, and click Delete.
|
Predefined Attack Groups
|
Specifies predefined attack groups that are used to match the
traffic against known attack objects.
|
Enter a valid predefined attack group name and do either one
the following:
- To add a predefined attack group, type it next to the Add button, and click Add.
- To remove a predefined attack group, select it in the
Predefined Attack groups box, and click Delete.
|
Custom Attacks
|
Specifies the custom attack objects to detect new attacks that
are unique to your network.
|
Select one or multiple custom attacks from the Custom Attacks
List and do either one of the following:
- To match a custom attack to the rule, click the left arrow.
- To remove the rule match for the custom attack to the
rule, select the rule match and click the right arrow.
|