12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Predefined signatures<br />

Intrusion Protection<br />

Figure 281:Configure Predefined IPS Signatures<br />

Action<br />

Packet Log<br />

Severity<br />

Exempt IP<br />

Select an action from the list. Action can be Pass, Drop, Reset, Reset<br />

Client, Reset Server, Drop Session, Clear Session, or Pass Session.<br />

See Table 36 for descriptions of the actions.<br />

Enable packet logging.<br />

Select a severity level from the dropdown list. Severity level can be<br />

Information, Low, Medium, High, or Critical. Severity level is set for<br />

individual signatures.<br />

Specify an exempt policy to exempt the IP address or subnet from IPS<br />

signature checking.<br />

Name: Enter a policy name.<br />

Source: Enter the source IP address or subnet. You must use a subnet<br />

mask when entering a host address. For example, for IP address<br />

172.168.1.1, you must enter 172.168.1.1/32.<br />

Destination: Enter the destination IP address or subnet. Follow the<br />

same rule as the source IP and subnet.<br />

Fine tuning IPS predefined signatures for enhanced system performance<br />

By default, the <strong>FortiGate</strong> unit will have most of the predefined signatures enabled<br />

and will log all of them. To meet your specific network requirements, you need to<br />

fine tune the signature settings.<br />

By fine tuning the signatures and log settings you can provide the best protection<br />

available but also free up valuable <strong>FortiGate</strong> resources. Fine tuning allows you to<br />

turn off features that you are not using. By turning off signatures and logs that you<br />

do not use, you allow the <strong>FortiGate</strong> unit to perform tasks faster thus improving<br />

overall system performance.<br />

Not all systems require you to scan for all signatures of the IPS suite all the time.<br />

For example. If you have a <strong>FortiGate</strong> unit that is controlling <strong>com</strong>puters that only<br />

have access to an internal database and do not have access to the internet or<br />

email, there is no point having the Fortigate unit scanning for certain types of<br />

signatures such as email, IM, and P2P.<br />

By telling the <strong>FortiGate</strong> unit not to look for these signatures, you will maintain a<br />

high level of security and increase overall performance.<br />

You should also review exactly how you use the information provided by the<br />

logging feature. If you find that you do not review the information, it is best to turn<br />

off the logging feature. Logging is best used to provide actionable intelligence.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

416 01-30005-0203-20070830

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!