The intrusion detection and prevention system (IPS) can quickly detect malicious activity in your local network or from the Internet, identify, record and prevent various threats, and generate detailed reports on each suspicious event. Security breaches are usually detected by means of heuristic techniques and matching with signatures of already known attacks. If you have the corresponding license, UserGate will be regularly providing you with its up-to-date databases of heuristic rules and attacks' signatures. IPS can track and proactively block all the detected attacks in real time, e.g. terminate malicious network connections, send notifications to network administrators, log the suspicious activity, and so on.
To get started with IPS, perform the following:
Name |
Description |
---|---|
Step 1. Create required IPS profiles |
An IPS profile is a set of signatures relevant for the protection of certain services. Administrators can create any number of IPS profiles to protect various services. It is recommended that you avoid adding excessive signatures to profiles and use only signatures that are really important for security. For example, do not add UDP-specific signatures to a profile that protects a TCP-based service. When there are too many signatures, the system will be processing the traffic longer due to additional workload on the CPU. |
Step 2. Create the IPS rules |
The IPS rules define IPS actions depending on the traffic type checked by the IPS module according to the assigned IPS profiles. |
To set up the IPS profile, click IPS profiles in the Security policies-->Library and then add all necessary signatures to the policy. The IPS signatures are regularly updated and delivered by UserGate to the corresponding subscribers. Each signature contains the following fields:
Name |
Description |
---|---|
Signature |
Name of the signature |
Risk |
Signature's risk from 1 (low risk) to 5 (high risk) |
Protocol |
Protocol of the signature:
|
Category |
Category is group of signatures with some common properties. List of categories can be extended in the future:
|
Classtype |
Classtype is group of signatures based on the type of attack class. Supported the following classtypes:
|
When adding signatures to a IPS profile, administrators can use flexible filters, e.g. select only signature with a very high risk that use TCP protocol in the 'botcc' category across all classes.
IPS rules define a traffic to which a IPS profile will be applied and an action that the IPS module must perform in response to such signatures.
Important! Rules are applied from top to bottom in the same order as they are displayed in the console. The system always applies only the first rule for which all criteria are met. This means that the most specific rules must be in the upper part of the list, while the broader rules must be in the bottom. If you want to change the order of rules, use the Up/Down buttons.
Important! The rule will be applied only when all its specific conditions are met. The Negate checkbox makes the condition opposite to the initial condition, i.e. corresponds to logical negation (NOT).
Important! If no rules have been created, then IPS will not work.
To set up the IPS rules, click Add in the Security policies--> Intrusion prevention section and specify the following fields:
Name |
Description |
---|---|
Enabled |
Enables or disables a rule. |
Name |
Rule name. |
Description |
Description of a rule. |
Action |
The following options are supported:
|
Source |
A source zone and/or a list of source IP addresses for the traffic. |
Destination |
A destination zone and/or a list of destination IP addresses for the traffic. |
Service |
Service type, e.g. HTTP, DNS, etc. |
Application |
List of applications to which this rule will be applied. |
Profiles |
The list of IPS profiles that have been created in the previous step. |