12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Intrusion Protection<br />

Predefined signatures<br />

Table 36: Actions to select for each predefined signature (Continued)<br />

Reset Client<br />

Reset Server<br />

Drop Session<br />

Pass Session<br />

Clear Session<br />

When a packet triggers a signature, the <strong>FortiGate</strong> unit generates an<br />

alert and drops the packet. The <strong>FortiGate</strong> unit sends a reset to the<br />

client and drops the firewall session from the firewall session table.<br />

This is used for TCP connections only. If set for non-TCP connection<br />

based attacks, the action will behave as Clear Session. If the Reset<br />

Client action is triggered before the TCP connection is fully<br />

established, it acts as Clear Session.<br />

When a packet triggers a signature, the <strong>FortiGate</strong> unit generates an<br />

alert and drops the packet. The <strong>FortiGate</strong> unit sends a reset to the<br />

server and drops the firewall session from the firewall session table.<br />

This is used for TCP connections only. If set for non-TCP connection<br />

based attacks, the action will behave as Clear Session. If the Reset<br />

Server action is triggered before the TCP connection is fully<br />

established, it acts as Clear Session.<br />

When a packet triggers a signature, the <strong>FortiGate</strong> unit generates an<br />

alert and drops the packet. For the remainder of this packet’s firewall<br />

session, all follow-up packets are dropped.<br />

When a packet triggers a signature, the <strong>FortiGate</strong> unit generates an<br />

alert and allows the packet through the firewall. For the remainder of<br />

this packet’s session, the IPS is bypassed by all follow-up packets.<br />

When a packet triggers a signature, the <strong>FortiGate</strong> unit generates an<br />

alert and the session to which the packet belongs is removed from the<br />

session table immediately. No reset is sent.<br />

For TCP, all follow-up packets could be dropped.<br />

For UDP, all follow-up packets could trigger the firewall to create a<br />

new session.<br />

Using display filters<br />

By default, all the predefined signatures are displayed. You can apply filters to<br />

display only the signatures you want to view. For example, if you want to view the<br />

enabled signatures only, you can use the Enable or Disable status filter. See<br />

“Adding filters to web-based manager lists” on page 43.<br />

To apply filters to the predefined signature list<br />

1 Go to Intrusion Protection > Predefined.<br />

2 Select the filter icon beside the column name in the signature table.<br />

3 In the Edit Filters dialog box, specify the filtering criteria and enable the filter.<br />

If you use severity level filter, you can select one or multiple severity levels.<br />

4 Select OK.<br />

Configuring predefined signatures<br />

For each signature, configure the action the <strong>FortiGate</strong> IPS takes when it detects<br />

an attack. The <strong>FortiGate</strong> IPS can pass, drop, reset or clear packets or sessions.<br />

Enable or disable packet logging. Select a severity level to be applied to the<br />

signature.<br />

You can also specify the traffic by source and destination addresses to be<br />

exempted from IPS filtering.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

01-30005-0203-20070830 415

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!