IPS Security Parent topic

Each security policy can specify an intrusion protection profile that determines the level of protection against buffer overflows, illegal code execution, and other attempts to exploit system vulnerabilities. The default profile protects clients and servers from all known critical-, high-, and medium-severity threats.
Intrusion prevention integrates a high-performance Deep Packet Inspection architecture and dynamically updated signature database to deliver complete network protection from application exploits, worms and malicious traffic. In addition, Intrusion Prevention provides access control for Instant Messenger (IM) and Peer-to-Peer (P2P) applications.
Use customized profiles to minimize vulnerability checking for traffic between trusted security zones and to maximize protection for traffic received from untrusted zones (Internet) as well as the traffic sent to highly sensitive destinations (server farms).
In Deep Edge, you can define the filtering rule criteria and then select which IPS rules apply to traffic.
Categories for block or monitor actions:
  • Miscellaneous—SIP Foundry sipiXtapi Buffer Overflow
  • File transfer server—NetTerm NetFTPF User Buffer Command or 3Com 3CDaemon FTP server overflow
  • Web server—Microsoft Windows Explorer Drag and Drop Remote Code Execution, Microsoft IIS WebDAV Long Request Buffer Overflow, and others
  • General server—Microsoft SSL PCT Buffer Overflow Vulnerability, Solaris Telnetd User Authentication Bypass Vulnerability, and others
  • Client—Microsoft Visual Studio WMI Object Broker Unspecified Code Execution, Microsoft Internet Explorer XMLHTTP ActiveX Control setRequestHeader Code Execution, and others
  • IM—IBM Lotus Sametime Multiplexer Buffer Overflow, MSN MSNP2P Message Integer Overflow, and others
  • Message server—Sendmail Signal Race Vulnerability, Microsoft Exchange SMTP Service Extended Verb Request Buffer Overflow, and others