IPS Policies Overview
An intrusion prevention system (IPS) policy defines how your device handles the network traffic. It allows you to enforce various attack detection and prevention techniques on traffic traversing your network. You can define policy rules to match a section of traffic based on a zone, network, and application, and then take active or passive preventive actions on that traffic.
The intrusion prevention system (IPS) profile is deployed on a device by associating the profile with a firewall policy intent, which is deployed on the device. You can associate IPS rules or exempt rules with an IPS profile.
To access the IPS Policy page, click . Use this page to view, add, modify, clone, or delete the IPS rules and exempt rules in the IPS profiles.
Field Descriptions - IPS Policy Page
| Field | Description |
|---|---|
| Name | The name of the IPS rule. |
| IPS Signatures |
Displays the IPS signatures associated with the IPS rule. If multiple signatures are associated with the rule, the number of additional signatures is displayed. Hover over the number to view the full list of signatures. |
| Action |
Displays the action to be taken when the IPS rule is matched. |
| Options |
Displays the configuration options for IPS rules. Hover over the arrow icon to view the logging options configured. |