IPS Security Settings Parent topic

Each security policy can specify an intrusion protection profile that determines the level of protection against buffer overflows, illegal code execution, and other attempts to exploit system vulnerabilities. The default profile protects clients and servers from all known critical-, high-, and medium-severity threats.
Intrusion prevention integrates a high-performance Deep Packet Inspection architecture and dynamically updated signature database to deliver complete network protection from application exploits, worms and malicious traffic. In addition, Intrusion Prevention provides access control for Instant Messenger (IM) and Peer to Peer (P2P) applications.
Customized profiles can be used to minimize vulnerability checking for traffic between trusted security zones, and to maximize protection for traffic received from untrusted zones, such as the Internet, as well as the traffic sent to highly sensitive destinations, such as server farms.
Categories for which the block or monitor action can be set include:
  • Miscellaneous—such as SIP Foundry sipiXtapi Buffer Overflow
  • File transfer server—such as NetTerm NetFTPF User Buffer Command or 3Com 3CDaemon FTP server overflow
  • Web server—such as Microsoft Windows Explorer Drag and Drop Remote Code Execution, Microsoft IIS WebDAV Long Request Buffer Overflow, and others
  • General server—Microsoft SSL PCT Buffer Overflow Vulnerability, Solaris Telnetd User Authentication Bypass Vulnerability, and others
  • Client—such as Microsoft Visual Studio WMI Object Broker Unspecified Code Execution, Microsoft Internet Explorer XMLHTTP ActiveX Control setRequestHeader Code Execution, and others
  • IM—IBM Lotus Sametime Multiplexer Buffer Overflow, MSN MSNP2P Message Integer Overflow, and others
  • Message server—Sendmail Signal Race Vulnerability, Microsoft Exchange SMTP Service Extended Verb Request Buffer Overflow, and others.