12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IPS CLI configuration<br />

Intrusion Protection<br />

Action<br />

Severity<br />

Threshold<br />

Select an action from the dropdown list: Pass, Drop, Reset, Reset Client, Reset<br />

Server, Drop Session, Pass Session, Clear Session. See Table 36 for<br />

descriptions of the actions.<br />

Select a severity level from the dropdown list: Information, Low, Medium, High,<br />

or Critical.<br />

For the IPS anomalies that include the threshold setting, traffic over the<br />

specified threshold triggers the anomaly.<br />

IPS CLI configuration<br />

system autoupdate ips<br />

ips global fail-open<br />

ips global ip_protocol<br />

ips global socket-size<br />

This section describes the CLI <strong>com</strong>mands that extend features available through<br />

the web-based manager. For <strong>com</strong>plete descriptions and examples of how to<br />

enable additional features through CLI <strong>com</strong>mands, see the <strong>FortiGate</strong> CLI<br />

Reference.<br />

When the IPS is updated, user-modified settings are retained. If re<strong>com</strong>mended<br />

IPS signature settings have not been modified, and the updated settings are<br />

different, signature settings will be set according to accept-re<strong>com</strong>mendedsettings.<br />

If for any reason the IPS should cease to function, it will fail open by default. This<br />

means crucial network traffic will not be blocked, and the firewall will continue to<br />

operate while the problem is being resolved.<br />

Save system resources by restricting IPS processing to only those services<br />

allowed by firewall policies.<br />

Set the size of the IPS buffer.<br />

(config ips anomaly) config limit<br />

Access the config limit sub<strong>com</strong>mand using the config ips anomaly<br />

<strong>com</strong>mand. Use this <strong>com</strong>mand for session control based on source<br />

and destination network address. This <strong>com</strong>mand is available for<br />

tcp_src_session, tcp_dst_session, icmp_src_session,<br />

icmp_dst_session, udp_src_session, udp_dst_session.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

422 01-30005-0203-20070830

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!