We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

This Firmware Version Is End-Of-Support

Documentation for this product is no longer updated. Please see End-of-Support for CloudGen Firewall Firmware for further information on our EoS policy.

How to Configure IPS Policies

  • Last updated on

IPS policies control the behavior of the IPS when an attack is detected. You can define multiple IPS policies and apply them to individual access rules as needed.

 In this article:

Default IPS Policy

By default all access rules use the default IPS policy. All traffic is scanned according to this policy while the IPS is enabled. To turn off IPS scanning for an individual access rule, choose No Scan Policy from the IPS Policy dropdown. This makes sense for connections for which you want to avoid being blocked in case of a IPS misconfiguration.

Custom Policy Section

Within the Custom Policy section it is possible to create and manage user created IPS policies. Each of the created policies can be individually applied to access rules. The configuration interface for IPS policies is identical for the default policy and custom policies.

Policy Configuration

  1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall > IPS Policies.
  2. Click Lock.
  3. Select Enable IPS.
  4. If you want malicious traffic to be dropped, disable the Report only check box.

    Barracuda Network recommends to use Report only mode and to monitor the log files for false positives for an initial deployment phase and then disable Report only mode later.

  5. Select Scan SSL-Intercepted Traffic if decrypted SSL traffic should be scanned. Only available with enabled Application Control 2.0 with SSL Interception.
  6. Configure the settings described in the following sections: 

    ips_policy.png

    From Client/From Server – Allows different actions for data streams of a session. Streams initiated from the host are classified as From Client, while answers from the target host are classified as From Server.

    It may be necessary for system administrators to configure different IPS policy settings for the traffic source and destination.

    • Action – Describes the protection behavior of the IPS engine in case of detection of malicious traffic:
    • Drop – Drops malicious network traffic.
    • Log – Only informs about malicious network traffic according to the defined Notification.
    • None – Malicious network traffic will be neither reported nor dropped. 

    Notification – Describes the warning behavior (Eventing) of the IPS engine in case of detection of malicious traffic:

    • Alert – An Alert Event will be generated.
    • Warn – A Warning Event will be generated.
    • Notice – A Notice Event will be generated.

    Severity – Detected malicious network traffic is classified by the IPS engine into the following severities:

    • Critical
    • High
    • Medium
    • Low
    • Informational  
    IPS Policy Management

    ips_conf.png

    Custom Policies 

    • Click Add to create an IPS Policy with custom settings.
    • Click Delete to remove the selected IPS Policy.
    • Click Clone to copy the selected IPS Policy. 

    Copy to Default Policy – Changes the currently selected policy to the default policy.

    Explicit Signatures – For each IPS Policy, a set of custom signature actions can be defined and IPS scanning can be limited to this user defined set. 

    Scan only for explicit signatures – If enabled, the IPS scanning will only be performed for IPS signatures that have been edited via the explicit action link.

    Edit explicit actions – Click this link to modify the action of a IPS signature. 

    IPS Signatures – Explicit Actions:

    ips_conf2.png


    • Edit – Select the desired IPS signature and click Edit Selected to modify the according action. Click Edit All to change actions for all currently signatures displayed.
    • Severity Filter – Select the desired severity to filter for.
    • Policy Filter – Select the desired policy type:
      • All – Display all available IPS signatures.
      • Overwritten – Display only IPS signatures with custom actions.
      • Default only – Display only IPS signatures with default actions.       
  7. Click Send Changes and Activate.

Assign IPS Policy to access rules

As soon as a custom IPS Policy is configured, it is selectable within a access rule. Open a access rule and select the desired IPS Policy. Now traffic that is handled by this access rule will be scanned according to the selected policy.

Last updated on