config ips sensor
Description: Configure IPS sensor.
edit <name>
set comment {var-string}
set replacemsg-group {string}
set block-malicious-url [disable|enable]
set scan-botnet-connections [disable|block|...]
set extended-log [enable|disable]
config entries
Description: IPS sensor filter.
edit <id>
set rule <id1>, <id2>, ...
set location {user}
set severity {user}
set protocol {user}
set os {user}
set application {user}
set cve <cve-entry1>, <cve-entry2>, ...
set status [disable|enable|...]
set log [disable|enable]
set log-packet [disable|enable]
set log-attack-context [disable|enable]
set action [pass|block|...]
set rate-count {integer}
set rate-duration {integer}
set rate-mode [periodical|continuous]
set rate-track [none|src-ip|...]
config exempt-ip
Description: Traffic from selected source or destination IP addresses is exempt from this signature.
edit <id>
set src-ip {ipv4-classnet}
set dst-ip {ipv4-classnet}
next
end
set quarantine [none|attacker]
set quarantine-expiry {user}
set quarantine-log [disable|enable]
next
end
next
end
Parameter Name | Description | Type | Size |
---|---|---|---|
comment | Comment. | var-string | Maximum length: 255 |
replacemsg-group | Replacement message group. | string | Maximum length: 35 |
block-malicious-url | Enable/disable malicious URL blocking. disable: Disable malicious URL blocking. enable: Enable malicious URL blocking. |
option | - |
scan-botnet-connections | Block or monitor connections to Botnet servers, or disable Botnet scanning. disable: Do not scan connections to botnet servers. block: Block connections to botnet servers. monitor: Log connections to botnet servers. |
option | - |
extended-log | Enable/disable extended logging. enable: Enable setting. disable: Disable setting. |
option | - |
Parameter Name | Description | Type | Size |
---|---|---|---|
rule <id> |
Identifies the predefined or custom IPS signatures to add to the sensor. Rule IPS. |
integer | Minimum value: 0 Maximum value: 4294967295 |
location | Protect client or server traffic. | user | Not Specified |
severity | Relative severity of the signature, from info to critical. Log messages generated by the signature include the severity. | user | Not Specified |
protocol | Protocols to be examined. set protocol ? lists available protocols. all includes all protocols. other includes all unlisted protocols. | user | Not Specified |
os | Operating systems to be protected. all includes all operating systems. other includes all unlisted operating systems. | user | Not Specified |
application | Applications to be protected. set application ? lists available applications. all includes all applications. other includes all unlisted applications. | user | Not Specified |
cve <cve-entry> |
List of CVE IDs of the signatures to add to the sensor CVE IDs or CVE wildcards. |
string | Maximum length: 19 |
status | Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Filters with default status of disable will not be used. disable: Disable status of selected rules. enable: Enable status of selected rules. default: Default. |
option | - |
log | Enable/disable logging of signatures included in filter. disable: Disable logging of selected rules. enable: Enable logging of selected rules. |
option | - |
log-packet | Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format for diagnostic use. disable: Disable packet logging of selected rules. enable: Enable packet logging of selected rules. |
option | - |
log-attack-context | Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. disable: Disable logging of detailed attack context. enable: Enable logging of detailed attack context. |
option | - |
action | Action taken with traffic in which signatures are detected. pass: Pass or allow matching traffic. block: Block or drop matching traffic. reset: Reset sessions for matching traffic. default: Pass or drop matching traffic, depending on the default action of the signature. |
option | - |
rate-count | Count of the rate. | integer | Minimum value: 0 Maximum value: 65535 |
rate-duration | Duration (sec) of the rate. | integer | Minimum value: 1 Maximum value: 65535 |
rate-mode | Rate limit mode. periodical: Allow configured number of packets every rate-duration. continuous: Block packets once the rate is reached. |
option | - |
rate-track | Track the packet protocol field. none: none src-ip: Source IP. dest-ip: Destination IP. dhcp-client-mac: DHCP client. dns-domain: DNS domain. |
option | - |
quarantine | Quarantine method. none: Quarantine is disabled. attacker: Block all traffic sent from attacker's IP address. The attacker's IP address is also added to the banned user list. The target's address is not affected. |
option | - |
quarantine-expiry | Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker. | user | Not Specified |
quarantine-log | Enable/disable quarantine logging. disable: Disable quarantine logging. enable: Enable quarantine logging. |
option | - |
Parameter Name | Description | Type | Size |
---|---|---|---|
src-ip | Source IP address and netmask. | ipv4-classnet | Not Specified |
dst-ip | Destination IP address and netmask. | ipv4-classnet | Not Specified |
config ips sensor
Description: Configure IPS sensor.
edit <name>
set comment {var-string}
set replacemsg-group {string}
set block-malicious-url [disable|enable]
set scan-botnet-connections [disable|block|...]
set extended-log [enable|disable]
config entries
Description: IPS sensor filter.
edit <id>
set rule <id1>, <id2>, ...
set location {user}
set severity {user}
set protocol {user}
set os {user}
set application {user}
set cve <cve-entry1>, <cve-entry2>, ...
set status [disable|enable|...]
set log [disable|enable]
set log-packet [disable|enable]
set log-attack-context [disable|enable]
set action [pass|block|...]
set rate-count {integer}
set rate-duration {integer}
set rate-mode [periodical|continuous]
set rate-track [none|src-ip|...]
config exempt-ip
Description: Traffic from selected source or destination IP addresses is exempt from this signature.
edit <id>
set src-ip {ipv4-classnet}
set dst-ip {ipv4-classnet}
next
end
set quarantine [none|attacker]
set quarantine-expiry {user}
set quarantine-log [disable|enable]
next
end
next
end
Parameter Name | Description | Type | Size |
---|---|---|---|
comment | Comment. | var-string | Maximum length: 255 |
replacemsg-group | Replacement message group. | string | Maximum length: 35 |
block-malicious-url | Enable/disable malicious URL blocking. disable: Disable malicious URL blocking. enable: Enable malicious URL blocking. |
option | - |
scan-botnet-connections | Block or monitor connections to Botnet servers, or disable Botnet scanning. disable: Do not scan connections to botnet servers. block: Block connections to botnet servers. monitor: Log connections to botnet servers. |
option | - |
extended-log | Enable/disable extended logging. enable: Enable setting. disable: Disable setting. |
option | - |
Parameter Name | Description | Type | Size |
---|---|---|---|
rule <id> |
Identifies the predefined or custom IPS signatures to add to the sensor. Rule IPS. |
integer | Minimum value: 0 Maximum value: 4294967295 |
location | Protect client or server traffic. | user | Not Specified |
severity | Relative severity of the signature, from info to critical. Log messages generated by the signature include the severity. | user | Not Specified |
protocol | Protocols to be examined. set protocol ? lists available protocols. all includes all protocols. other includes all unlisted protocols. | user | Not Specified |
os | Operating systems to be protected. all includes all operating systems. other includes all unlisted operating systems. | user | Not Specified |
application | Applications to be protected. set application ? lists available applications. all includes all applications. other includes all unlisted applications. | user | Not Specified |
cve <cve-entry> |
List of CVE IDs of the signatures to add to the sensor CVE IDs or CVE wildcards. |
string | Maximum length: 19 |
status | Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Filters with default status of disable will not be used. disable: Disable status of selected rules. enable: Enable status of selected rules. default: Default. |
option | - |
log | Enable/disable logging of signatures included in filter. disable: Disable logging of selected rules. enable: Enable logging of selected rules. |
option | - |
log-packet | Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format for diagnostic use. disable: Disable packet logging of selected rules. enable: Enable packet logging of selected rules. |
option | - |
log-attack-context | Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. disable: Disable logging of detailed attack context. enable: Enable logging of detailed attack context. |
option | - |
action | Action taken with traffic in which signatures are detected. pass: Pass or allow matching traffic. block: Block or drop matching traffic. reset: Reset sessions for matching traffic. default: Pass or drop matching traffic, depending on the default action of the signature. |
option | - |
rate-count | Count of the rate. | integer | Minimum value: 0 Maximum value: 65535 |
rate-duration | Duration (sec) of the rate. | integer | Minimum value: 1 Maximum value: 65535 |
rate-mode | Rate limit mode. periodical: Allow configured number of packets every rate-duration. continuous: Block packets once the rate is reached. |
option | - |
rate-track | Track the packet protocol field. none: none src-ip: Source IP. dest-ip: Destination IP. dhcp-client-mac: DHCP client. dns-domain: DNS domain. |
option | - |
quarantine | Quarantine method. none: Quarantine is disabled. attacker: Block all traffic sent from attacker's IP address. The attacker's IP address is also added to the banned user list. The target's address is not affected. |
option | - |
quarantine-expiry | Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker. | user | Not Specified |
quarantine-log | Enable/disable quarantine logging. disable: Disable quarantine logging. enable: Enable quarantine logging. |
option | - |
Parameter Name | Description | Type | Size |
---|---|---|---|
src-ip | Source IP address and netmask. | ipv4-classnet | Not Specified |
dst-ip | Destination IP address and netmask. | ipv4-classnet | Not Specified |