Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Intelligent Inspection

IDP (Intrusion Detection and Prevention) intelligent inspection is designed to ensure that the firewall can continue to operate efficiently even when it is under high load conditions.

Understand Intelligent Inspection

You can enable IDP intelligent inspection and tune it dynamically to reduce the load of full IDP inspection. IDP does not reject or ignore the session by tuning the IDP inspection when the resource limits reach the configured CPU and memory threshold values.

To enable IDP intelligent inspection and the bypass feature, use the set security idp sensor-configuration flow intel-inspect-enable command.

Benefits of Intelligent Inspection

  • Gives importance to critical IDP inspection.

  • Avoids low-priority IDP inspection.

  • Reduces high system resource usage.

Security Mechanisms for Tuning IDP Intelligent Inspection

The following configurations allow for fine-tuning of the IDP system to optimize performance and focus on critical threats:

  • Dynamic policy—Critical, major, and minor are the three important signature severities. You can tune the policy dynamically to include only the signatures of desired severity level. To include signatures of only critical severity, use the command set security idp sensor-configuration flow intel-inspect-signature-severity critical. To include signatures of critical and major severity, use the command set security idp sensor-configuration flow intel-inspect-signature-severity major. To include signatures of both critical, major and minor severity, use the command set security idp sensor-configuration flow intel-inspect-signature-severity minor. By default, attacks with severity as critical are included.

  • Content decompression—The content decompression can be avoided only when Intel inspect is enabled and thresholds are reached. The protocol decoder decompresses the protocol content if the content is in a compressed state. You can avoid decompression of the protocol content by configuring the set security idp sensor-configuration flow intel-inspect-disable-content-decompress command.

  • Selective protocols—By default, IDP inspects all critical protocols. You can specify the list of critical protocols for IDP processing. To specify the list of protocols, use the set security idp sensor-configuration flow intel-inspect-protocols protocol command. IDP does not inspect noncritical protocols.

  • Inspection depth—For each session, by default, IDP inspects all the bytes of the session. By specifying inspection depth, IDP limits inspection to only specified number of bytes. To enable the inspection depth, use the command set security idp sensor-configuration flow intel-inspect-session-bytes-depth value. By default, the IDP intelligent inspection disables the inspection depth, which means all bytes are inspected.

CPU Utilization

You can configure the threshold limits for IDP inspection. When the CPU usage reaches the configured threshold, IDP intelligent inspection is activated.

To configure the threshold limits, use the following commands:

  • set security idp sensor-configuration flow intel-inspect-cpu-usg-threshold value

  • set security idp sensor-configuration flow intel-inspect-cpu-usg-tolerance value

Figure 1: Understanding CPU Usage Diagram of CPU usage thresholds with five levels: Upper, Bypass, Lower, Intelligent Inspection, and Intelligent Inspection Lower. Tolerance ranges are marked. Vertical axis shows 0 to 100 percent CPU usage.

CPU utilization behaves as follows:

  • IDP stops full IDP processing on the new session when the CPU utilization reaches the configured intelligent inspection threshold. IDP processes only the tuned security inspection. This behavior triggers a syslog message to activate the IDP intelligent inspection.

  • IDP continues to function in intelligent inspection mode when the CPU utilization exceeds the intelligent inspection threshold and it lies between the IDP bypass threshold and intelligent inspection lower threshold.

  • IDP starts the full IDP inspection on the new session and triggers a syslog to deactivate the IDP intelligent inspection when the CPU utilization drops below the lower threshold of intelligent inspection.

  • The IDP intelligent bypass feature activates when the CPU utilization reaches the IDP bypass threshold.

Memory Utilization

You can configure the memory limits for the IDP inspection. When the memory usage reaches the configured limit, it activates the IDP intelligent inspection.

To configure the available memory limits, use the following commands:

  • set security idp sensor-configuration flow intel-inspect-free-mem-threshold value

  • set security idp sensor-configuration flow intel-inspect-mem-tolerance value

Figure 2: Understanding Memory Usage Graph showing memory usage thresholds with vertical axis labeled Memory Usage from 0 percent to 100 percent. Four horizontal lines mark thresholds: Available Memory Lower, Available Memory Upper, Intelligent Inspection Available Memory Lower, and Intelligent Inspection Available Memory Upper.

Memory utilization behaves as follows:

  • IDP activates the IDP intelligent inspection mode when the memory utilization reaches the intelligent inspection available memory lower threshold.

  • IDP continues to function in intelligent inspection mode when the memory utilization is in between intelligent inspection memory upper threshold and memory lower threshold.

  • IDP activates the IDP bypass feature when the memory utilization reaches the available memory lower threshold.

  • IDP activates to normal mode when the memory utilization drops and exceeds the intelligent inspection available memory upper threshold.

Limitation

IDP intelligent inspection is supported only at the primary logical system level.

Example: Configure IDP Intelligent Inspection

The IDP intelligent inspection helps the device to recover from the overload state when the device exceeds the configured CPU and memory threshold limit.

This example shows how to enable the IDP intelligent inspection and tune the IDP inspection dynamically to reduce the load of full IDP inspection.

Requirements

Read IDP Sensor Configuration to understand when and how the IDP intelligent inspection and IDP bypass feature works.

Overview

Earlier, when the device reached the configured CPU and memory threshold values, IDP ignored or rejected new sessions. Also, when the device crossed the upper threshold, IDP discarded packets of existing and new session.

Tuning the IDP inspection helps the device gradually increase the CPU and memory utilization and gives importance to critical inspection. This example shows how to tune the IDP inspection after enabling the IDP intelligent inspection.

Configuration

CLI Quick Configuration

To quickly configure this example, copy the following commands, paste them into a TXT file, remove any line breaks, and change any details necessary to match your network configuration. Copy and paste the commands into the CLI at the [edit] hierarchy level. Enter commit from configuration mode.

Procedure

Step-by-Step Procedure

To configure the IDP intelligent inspection:

  1. Enable the IDP intelligent inspection.

  2. Configure the CPU threshold limit.

  3. Configure the CPU tolerance.

  4. Configure the memory tolerance.

  5. Configure the memory limit.

  6. Specify the severity level.

  7. Disable content decompression.

  8. Configure the packet inspection depth.

  9. Configure the protocol for inspection.

Results

From configuration mode, confirm your configuration by entering the show security idp sensor-configuration command. If the output does not display the intended configuration, repeat the instructions in this example to correct the configuration.

If you are done configuring the devices, enter commit from configuration mode.

Verification

Confirm that the configuration is working properly.

Verify the Status of All IDP Flow Counter Values

Purpose

Verify that the IDP intelligent inspection captures counter values.

Action
Meaning

The show command displays counters for the IDP intelligent inspection.

Verify the Status of IDP Current Policy

Purpose

Verify that the IDP intelligent inspection captures current policy.

Action
Meaning

The show security idp status command displays IDP current policy. Though you have enabled IDP intelligent inspection, the state of IDP intelligent inspection can be inactive when you execute show security idp status operational command. The reason is the configured CPU and memory threshold values don’t exceed the resource limit. When the CPU usage reaches the configured threshold, the state of IDP intelligent inspection becomes active.

Protocol-Specific Intelligent-Offload

The existing Intelligent offload feature in IDP offloads a session when the limit for the examined bytes is reached. In addition, the inspection limit is not granular, and it is applied to all the sessions irrespective of the protocol or service.

With the ability to enable or disable IDP intelligent offloading on a per protocol basis, the administrators can use the flexibility to decide which protocols should leverage the offloading capability. The administrators can also configure the offload limit per protocol.

The Protocol-Specific Intelligent-Offload Configuration feature in the IDP system allows you to tailor inspection depth limits for different protocols, enhancing both performance and security. By configuring separate offload limits for protocols such as SSH and FTP, you can optimize resource usage and ensure more efficient session inspections.

This feature simplifies configuration and management with clear CLI commands, making it easier for administrators to implement and adjust offload settings based on specific network requirements.

Configure Protocol-Specific Offload Limits

You can use the new options to configure the offload limit per protocol by specifying the protocol and setting the offload limit.

[edit]

user@host# set security idp sensor-configuration global intelligent-offload-tunable ?

The range for the offloads limit is the same for all the protocols, that is, 0 to 4294967295 bytes. Offload limit range is same for all protocols and range is 0 to 4294967295 in bytes and 0 means unlimited inspection.

You can configure the limits in KB, MB, and GB, in which case you must append the end of the limit value with k, m, and g respectively.

The set security idp sensor-configuration global intelligent-offload disable command disables intelligent offload globally. You cannot configure set security idp sensor-configuration global intelligent-offload disable as well as the per protocol custom offload limit.

Precedence of offload limit
  • If an offload limit is configured for a protocol, then that offload limit has the highest precedence for that protocol. For example, if the limit is configured for the protocol MYSQL, the session offload limit is taken from the configuration and not from the detector-capabilities.xml file.

  • If no offload limit is configured for a protocol, but limits exist in the detector-capablities.xml file, the limit from the file is applied for that protocol.

  • If the detector-capabilities.xml file lacks offload limits for a protocol, the default limit is 256 KB. In conservative mode, intelligent offload sets the limit to 1 MB. If the intelligent offload is disabled, no offloading occurs.

If you use the set security idp sensor-configuration global intelligent-offload disable option, the offloading feature is disabled, and it will work for the entire data inspection until the session gets closed.