324
Preventing attacks
Blocking suspicious or malicious traffic with IDS
Prerequisites
None.
To apply IDS/IPS policies to forward filters
1
In the SGMI, in the left pane, under Policy, click
Policy Parameters
.
2
In the right pane, under Forward Filter, in the Packet filter drop-down list, select a packet filter.
3
In the IDS/IPS policy drop-down list, select a pre-configured or customized policy.
4
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
For further information related to this topic, see the following:
■
Applying IDS/IPS policies to Web VPN connections
Applying an IDS/IPS policy to a Web VPN connection provides detection and prevention of traffic that
matches signatures of possible threats.
Prerequisites
None.
To apply IDS/IPS policies to Web VPN connections
1
In the SGMI, in the left pane, under Policy, click
Policy Parameters
.
2
In the right pane, under Web VPN, in the IDS/IPS policy drop-down list, select a pre-configured or
customized policy.
3
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
For further information related to this topic, see the following:
■
Applying IDS/IPS policies to port forwarders
Applying an IDS/IPS policy to a port forwarder provides detection and prevention of traffic that
matches signatures of possible threats.
Prerequisites
None.
To apply IDS/IPS policies to port forwarders
1
In the SGMI, in the left pane, under Policy, click
Policy Parameters
.
2
In the right pane, under Port Forwarder, in the IDS/IPS policy drop-down list, select a pre-
configured or customized policy.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...