323
Preventing attacks
Blocking suspicious or malicious traffic with IDS
To apply IDS/IPS policies to VPN policies
1
In the SGMI, in the left pane, under Policy, click
VPN
.
2
In the right pane, on the VPN Policies tab, select a VPN policy, and then click
Properties
.
3
In the VPN policy properties dialog box, on the General tab, in the IDS/IPS policy name drop-down
list, select a pre-configured or customized policy.
4
Click
OK
.
5
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
For further information related to this topic, see the following:
■
“IPsec IKE policy Properties—General tab”
■
Applying IDS/IPS policies to clientless VPN connections
Clientless VPN provides a simple and secure way to extend network resources to remote users.
Applying an IDS/IPS policy to a clientless VPN connection provides detection and prevention of
malicious traffic at the point of entry, providing additional security to the connection.
Prerequisites
None.
To apply IDS/IPS policies to clientless VPN connections
1
In the SGMI, in the left pane, under Policy, click
Clientless VPN
.
2
In the right pane, on the Clientless VPN Profiles tab, select a clientless VPN profile, and then click
Properties
.
3
In the VPN Profile Properties dialog box, on the General tab, in the IDS/IPS policy drop-down list,
select a pre-configured or customized policy.
4
Click
OK
.
5
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
For further information related to this topic, see the following:
■
“VPN Profile Properties—General tab”
■
“Defining VPN profiles to allow communication between the security gateway and clientless
users”
Applying IDS/IPS policies to forward filters
Forward filters are applied to network interfaces to filter traffic arriving at or leaving the interfaces.
Packets must satisfy the filter or they are dropped. Applying an IDS/IPS policy to a forward filter
provides detection and prevention of packets that match signatures of possible threats.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...