Fortinet black logo

Administration Guide

Intrusion Prevention

Intrusion Prevention

Select an IPS profile from the tree menu to edit the profile details. Click Apply to apply any changes to the profile.

Name

The profile name.

Comment

Optionally, enter a description of the profile.

IPS Signatures

Click Add Signatures to add IPS signatures to the table. The signatures list can be filtered to simplify adding them.

To add or edit a signature's IP exemptions, select a signature then click Edit IP Exemptions.

Right-click on a signature to change the action (Pass, Monitor, Block, Reset, Default, or Quarantine), and to enable or disable Packet Logging.

IPS Filters

Click Add Filter to add IPS filters to the table. The filters list can be searched and filtered to simplify adding them.

Right-click on a signature to change the action (Pass, Monitor, Block, Reset, Default, or Quarantine), and to enable or disable Packet Logging.

Rate Based Signatures

Enable the required rate based signatures, then configure its options: Threshold, Duration, Track By, Action, and Block Duration.

Advanced Options

Enable or disable blocking malicious URLs.

Intrusion Prevention

Select an IPS profile from the tree menu to edit the profile details. Click Apply to apply any changes to the profile.

Name

The profile name.

Comment

Optionally, enter a description of the profile.

IPS Signatures

Click Add Signatures to add IPS signatures to the table. The signatures list can be filtered to simplify adding them.

To add or edit a signature's IP exemptions, select a signature then click Edit IP Exemptions.

Right-click on a signature to change the action (Pass, Monitor, Block, Reset, Default, or Quarantine), and to enable or disable Packet Logging.

IPS Filters

Click Add Filter to add IPS filters to the table. The filters list can be searched and filtered to simplify adding them.

Right-click on a signature to change the action (Pass, Monitor, Block, Reset, Default, or Quarantine), and to enable or disable Packet Logging.

Rate Based Signatures

Enable the required rate based signatures, then configure its options: Threshold, Duration, Track By, Action, and Block Duration.

Advanced Options

Enable or disable blocking malicious URLs.