ON THIS PAGE
Create IPS or Exempt Rules
You can create intrusion prevention system (IPS) rules or exempt rules only for customized IPS profiles.
Create IPS Rules
To create an IPS rule:
Setting |
Guideline |
---|---|
Rule Name |
CSO generates a unique rule name by default. You can modify the name if needed. The name must begin with an alphanumeric character and can contain alphanumeric characters and some special characters (colons, hyphens, forward slashes, periods, and underscores); 63-character maximum. |
Description |
Enter a description for the rule; the maximum length is 1024 characters. |
IPS Signatures |
You can add one or more IPS signatures and IPS signature static and dynamic groups to be associated with the rule:
|
IPS Action |
Select the action to be taken when the monitored traffic matches the attack objects specified in the rules:
|
Additional Actions |
In addition to the IPS action, you can configure one or more of the following additional actions:
|
Setting |
Guideline |
---|---|
Attack Logging |
Select the Enable check box to log an attack when it is detected. |
Alert Flag |
Select the Enable check box to set the alert flag in the attack log. |
Log Packets |
Select the Enable check box to log packets when an attack is detected. In response to a rule match, you can capture the packets received before and after the attack for further offline analysis of attacker behavior. You can configure the number of pre-attack and post-attack packets to be captured for this attack, and limit the duration of post-attack packet capture by specifying a timeout value. You must specify at least one of the Packets Before, Packets After, or Post Window Timeout fields. |
Packets Before |
Specify the number of packets received before an attack that should be captured for further analysis of the behavior of the attack. Range: 1 through 255. |
Packets After |
Specify the number of packets received after an attack that should be captured for further analysis of attacker behavior. Range: 1 through 255. |
Post Window Timeout |
Specify a time limit (in seconds) for capturing packets received after an attack. No packets are captured after the specified timeout has elapsed. Range: 1 through 1800. |
Setting |
Guideline |
---|---|
IP Action |
Select the action to be taken on future connections that use the same IP address: Note:
If there is an IP action match with more than one rule, then the most severe IP action of all the matched rules is applied. In decreasing order of severity, the actions are block, close, and notify.
|
IP Target |
Specify how the traffic should be matched for the configured IP actions:
|
Refresh Timeout |
Select the Enable check box to refresh the IP action timeout (that you specify in the Timeout Value field) if future traffic matches the IP actions configured. |
Timeout Value |
Configure the number of seconds that you want the IP action to remain in effect. For example, if you configure a timeout of 3600 seconds (1 hour) and traffic matches the IP actions configured, the IP action remains in effect for 1 hour. Range: 0 through 64,800 seconds. |
Log Taken |
Select the Enable check box to log the information about the IP action against the traffic that matches a rule. |
Log Creation |
Select the Enable check box generate an event when the IP action filter is triggered. |
Setting |
Guideline |
---|---|
Severity |
Select a severity level to override the inherited attack severity in the rules. The most dangerous level is critical, which attempts to crash your server or gain control of your network. Informational is the least dangerous level and is used by network administrators to discover holes in their security systems. |
Terminal |
Select the Enable check box to mark the IPS rule as terminal. When a terminal rule is matched, the device stops matching for the rest of the rules in that IPS profile. |
Create Exempt Rules
To create an exempt rule: