[Prev][Next][Report an Error]

Adding an Exempt Rulebase—Quick Configuration

You can use J-Web Quick Configuration to quickly configure and add an exempt rulebase.

Figure 57: Quick Configuration Page for Adding an Exempt Rulebase

 Quick Configuration
Page for Adding an Exempt Rulebase

To configure an exempt rulebase with Quick Configuration:

  1. Select Configuration > Quick Configuration > Security Policies > IDP.
  2. In the Policy Name text box, type a policy name.
  3. Under Exempt Rulebase, click Add to add an exempt rulebase.

    Figure 57 shows the Quick Configuration page for exempt rulebase.

  4. Fill in the information as described in Table 138.
  5. Click one of the following buttons:

Table 138: Adding an Exempt Rulebase Quick Configuration Page Summary

Field

Function

Actions

Policy Name

Specifies the name of the IDP policy.

Displays the name of the IDP policy.

Rulebase

Specifies IPS rule to create, modify, delete, and reorder the rules in a rulebase.

Displays the name of the rulebase.

Configure Rule Name and Description

Rule Name

Specifies the name of the IPS rulebase rule.

Type a rule name.

Description

Specifies the description for the rule.

Type the description for the rule.

Rule Match Criteria
From-Zone and Source Addresses/Address Sets

Match

Specifies the match criteria for the source zone for each rule.

Click the option button to enable the match criteria.

Source Address Book

Lists all the from-zone and source addresses/address sets for the policy.

Select the from-zone and source addresses/address sets from the list and do one of the following:

  • To match the from-zone and source address/address sets to the rule, click the left arrow.
  • To remove the rule match for the from-zone exceptions for each rule, click the right arrow.

Except

Specifies the zone exceptions for the from-zone and source address for each rule.

Click the option button to enable the exception criteria.

To-Zone and Destination Addresses/Address Sets

Match

Specifies the match criteria for the to-zone and source addresses for each rule.

Click the option button to enable the match criteria.

Destination Address Book

Lists all the to-zone and destination addresses/address sets for the policy.

Select the to-zone and destination addresses/address sets from the list and do either one of the following:

  • To match the to-zone and destination addresses/address sets to the rule, click the left arrow.
  • To remove the rule match for the to-zone exceptions for each rule, click the right arrow.

Except

Specifies the except criteria for the to-zone and source address for each rule.

Click the option button to enable exception criteria.

Attacks

Predefined Attacks

Specifies predefined attack objects that are used to match the traffic against known attacks.

Type a valid predefined attack name and do either one the following:

  • To add a predefined attack, type it next to the Add button, and click Add.
  • To remove a predefined attack, select it in the Predefined Attacks box, and click Delete.

Predefined Attack Groups

Specifies predefined attack groups that are used to match the traffic against known attack objects.

Enter a valid predefined attack group name and do either one the following:

  • To add a predefined attack group, type it next to the Add button, and click Add.
  • To remove a predefined attack group, select it in the Predefined Attack groups box, and click Delete.

Custom Attacks

Specifies the custom attack objects to detect new attacks that are unique to your network.

Select one or multiple custom attacks from the Custom Attacks List and do either one of the following:

  • To match a custom attack to the rule, click the left arrow.
  • To remove the rule match for the custom attack to the rule, select the rule match and click the right arrow.

[Prev][Next][Report an Error]