We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

How to Configure IPS Policies

  • Last updated on

In the Event Policy section of the FIREWALL > Intrusion Prevention page, define the actions to be taken when the IPS engine detects suspicious network traffic with the following threat levels: Critical, High, Medium, Low, and Information. When the firewall operates in Report Mode, you can adjust only the Log settings. When the firewall operates in Enforce Mode, you can also modify the Action for each severity.

Available Action settings include:

  • Drop – Blocks network traffic where malicious activities were detected.
  • Log Only – Reports network traffic where malicious activities were detected.
  • None – No action is taken.

Available Log settings include:

  • Alert
  • Warn
  • Notice

adjust_event_policy.png

You can view detected threats on the BASIC > Recent Threats page.

Last updated on