Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

IPS Policies Overview

An intrusion prevention system (IPS) policy defines how your device handles the network traffic. It allows you to enforce various attack detection and prevention techniques on traffic traversing your network. You can define policy rules to match a section of traffic based on a zone, network, and application, and then take active or passive preventive actions on that traffic.

The intrusion prevention system (IPS) profile is deployed on a device by associating the profile with a firewall policy intent, which is deployed on the device. You can associate IPS rules or exempt rules with an IPS profile.

To access the IPS Policy page, click Secure Edge > Security Subscriptions > IPS. Use this page to view, add, modify, clone, or delete the IPS rules and exempt rules in the IPS profiles.

Field Descriptions - IPS Policy Page

Table 1: Fields on the IPS Policy Page
Field Description
Name The name of the IPS rule.
IPS Signatures

Displays the IPS signatures associated with the IPS rule.

If multiple signatures are associated with the rule, the number of additional signatures is displayed. Hover over the number to view the full list of signatures.

Action

Displays the action to be taken when the IPS rule is matched.

Options

Displays the configuration options for IPS rules.

Hover over the arrow icon to view the logging options configured.