config security ips profile
The FortiADC Intrusion Prevention System (IPS) combines signature detection and prevention with low latency and excellent reliability. With intrusion protection, you can create multiple IPS profiles, each containing a complete configuration based on signatures. Then, you can apply any IPS profile to any L4 VS.
Intrusion Prevention System (IPS) technology protects your network from cybercriminal attacks by actively seeking and blocking external threats before they can reach potentially vulnerable network devices.
Use this command to configure an IPS profile.
Syntax
config security ips profile
edit <profile>
set comment {comment}
config entries
edit {id}
set rule {id1 id2 ….}
set status {disable | enable | default}
set log {disable | enable}
set action {pass | block | default}
set location {loc1 loc2…}
set severity {sev1 serv2…}
set protocol {proto1 proto2…}
set application {app1 app2…}
set os {os1 os2…}
set rate-count {count}
set rate-duration {duration}
set rate-mode {periodical | continuous}
set rate-track {field}
next
end
config load-balance virtual-server
set type l4-load-balance
set ips-profile {name}
next
end
rule | Use rule ID to identify the predefined IPS signatures to add to profile. |
status |
Specify status of the signatures included in filter. Default is default.
|
log |
Specify the logging status of the signatures included in the filter.
|
action |
Specify what action is taken with traffic in which signatures are detected. Default is the default.
|
location |
Specify the type of system to be protected. Default is all.
|
severity |
Relative importance of signature, from info to critical. Default is all.
|
protocol |
Specify protocols to be examined.
|
application |
Specify applications to be protected.
|
os |
Specify operating systems to be protected. Default is all.
|
rate-count | Count of the rate. range[0-65535] |
rate-duration | Duration (sec) of the rate. range[1-65535] |
rate-mode |
Rate limit mode.
|
rate-track |
Track the packet protocol field.
|
Example
ADC-6 (profile) # show full
config security ips profile
edit "default"
set comments "Prevent critical attacks."
config entries
edit 1
unset rule
set log enable
set status default
set action default
set location ALL
set severity medium high critical
set protocol ALL
set os ALL
set application ALL
next
end
next