It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda SecureEdge

IPS

  • Last updated on

The Intrusion Prevention System (IPS) actively monitors local and forwarding traffic for malicious activities and can also block suspicious traffic. The IPS engine analyzes network traffic and continuously compares the bitstream with its internal signatures database for malicious code patterns.

IPS-page.png

IPS Features

TCP Stream Reassembly

The SecureEdge engine provides support for TCP Stream Reassembly (SRA). In general, TCP streams are broken down into TCP segments that are encapsulated in IP packets. By manipulating how a TCP stream is segmented, it is possible to evade detection, for example, by overwriting a portion of a previous segment within a stream with new data in a subsequent segment. This method allows hackers to hide or obfuscate the network attack. The SecureEdge engine receives the segments in a TCP conversation, buffers them, and reassembles the segments into a correct stream, for example, by checking for segment overlaps, interleaved duplicate segments, invalid TCP checksums, and so forth. Afterwards, the SecureEdge engine passes the reassembled stream to the IPS engine for inspection.

URL Obfuscation

The IPS engine provides various countermeasures to avert possible network attacks based on the following URL encoding techniques: 

  • Escape encoding (% encoding)
  • Microsoft %u encoding
  • Path character transformations and expansions ( /./ , //, \ )
  • Premature URL ending
  • Long URL
  • Fake parameter
  • TAB separation
  • FTP Evasion

The IPS engine can avert FTP exploits where the attacker tries to evade the IPS by inserting additional spaces and Telnet control sequences in FTP commands.

TCP Split Handshake

The IPS engine provides an evasion countermeasure technique that can block the usage of TCP split-handshake attacks. Although the TCP split handshake is a legitimate way to start a TCP connection (RFC793), it can also be used by hackers to execute various network attacks by gaining access to the internal network by way of establishing a trusted IP connection, thus evading firewall and IPS policies.

Before You Begin

Settings 

Select the Default Action

  1. Go to https://se.barracudanetworks.com and log in with your existing Barracuda Cloud Control account.
  2. Go to Security Policy.
  3. Expand the Security menu on the left and select IPS
    Goto-IPS.png
  4. The IPS window opens. Select the Default Action.
    • Do Not Scan – IPS does not scan traffic matching the criteria.
    • Scan & Log – IPS only scans and logs the events.
    • Scan & Enforce – IPS is enforced.
      ips_def_90.png

Add a Rule 

  1. Go to https://se.barracudanetworks.com and log in with your existing Barracuda Cloud Control account.
  2. Go to Security Policy.
  3. Expand the Security menu on the left and select IPS
  4. The IPS window opens. To create a new rule, click Add Rule
    IPS-AddRule.png
  5. The Add New Rule window opens. Specify values for the following:
    • Name – Enter a unique name for a rule.
    • Description – Enter a brief description.
    • Action – Select an action:
      • Do Not Scan – IPS does not scan traffic matching the criteria.
      • Scan & Log – IPS only scans and logs the events.
      • Scan & Enforce – IPS is enforced. 
    • In the SOURCE CRITERIA section, specify values for the following:
      • Type – Select a source type. You can choose between IP/NetworkSite, and User/Group
      • IP/Network –   Enter an IP or network address, and click +
    • In the DESTINATION CRITERIA section, specify values for the following:
      • Type –   Select a destination type. You can choose between Application, DomainIP/Network, and Site
      • Application – Select an application. For more information, see How to Create Custom Applications.
      IPS-NewRule.png
  6. Click Save.
Edit an Existing Rule
  1. In the left menu, click Security Policy. Expand the Security menu on the left and select IPS
  2. The IPS window opens. Click on the pencil icon next to the rule you want to edit.
    Edit-IPS.png
  3. The Edit Rule window opens. Edit the value you are interested in.
  4. Click Save.

Remove an Existing Rule
  1. In the left menu, click Security Policy. Expand the Security menu on the left and select IPS
  2. The IPS window opens. Click on the trash can icon next to the rule you want to remove.
    Delete-IPS.png
  3. The Delete Rule window opens. 
    DeleteRule.png
  4. Click OK to confirm.

False Positives

In this section, you can configure the actions for false positives.  

Add a Rule 
  1. Go to https://se.barracudanetworks.com and log in with your existing Barracuda Cloud Control account.
  2. Go to Security Policy.
  3. Expand the Security menu on the left and select IPS
  4. The IPS window opens. Click the FALSE POSITIVES tab.
  5. To create a new rule, click Add Rule.
    FalsePositiveRule.png
  6. The Add New Rule window opens. Specify values for the following :
    • Name – Enter a unique name for a rule.
    • Description – Enter a brief description.
    • Action – Select an action:
      • Ignore – IPS ignores this exploit.
      • Log – IPS only scans and logs the events.
      • Enforce – IPS is enforced.
    • Exploit – Select an exploit from the drop-down list, or type to search. 
    • In the SOURCE CRITERIA section, specify values for the following:
      • Type – Select a source type. You can choose between IP/Network and Site
      • IP/Network –   Enter an IP or network address, and click +
    • In the  DESTINATION CRITERIA section, specify values for the following:
      • Type –   Select a type. You can choose between IP/Network and Site
      • IP/Network –   Enter an IP or network address, and click +.  
      FalsePositve-NewRule.png
  7. Click Save.
Edit an Existing Rule
  1. In the left menu, click Security Policy. Expand the Security menu on the left and select IPS
  2. The IPS window opens. Click the FALSE POSITIVES tab. Click on the pencil icon next to the rule you want to edit.
    EditFalsePositive.png
  3. The Edit Rule window opens. Edit the value you are interested in.
  4. Click Save.

Remove an Rule
  1. In the left menu, click Security Policy. Expand the Security menu on the left and select IPS
  2. The IPS window opens. Click the FALSE POSITIVES tab.
  3. Click on the trash can icon next to the rule you want to remove.
    DelFalsePositives.png
  4. The Delete Rule window opens. 
    DeleteRule.png
  5. Click OK to confirm.