Best practice deployment – Amer Networks E5Web GUI User Manual
Page 479

from the external network that are based on the SMTP protocol.
1.
Select the Rule Action for the IDP rule
2.
Now enter:
•
Action: Protect
•
Signatures: IPS_MAIL_SMTP
•
Click OK
If logging of intrusion attempts is desired, this can be configured by clicking in the Rule Actions
tab when creating an IDP rule and enabling logging. The Severity should be set to All in order to
match all SMTP attacks.
In summary, the following will occur: If traffic from the external network to the mail server occurs,
IDP will be activated. If traffic matches any of the signatures in the IPS_MAIL_SMTP signature
group, the connection will be dropped, thus protecting the mail server.
Using Individual Signatures
The preceding example uses an entire IDP group name when enabling IDP. However, it is
possible to instead specify a single signature or a list of signatures for an IDP rule. Individual
signatures are identified by their unique number ID and multiple signatures are specified as a
comma separated list of these IDs.
For example, to specify signatures with the ID 68343, the CLI in the above example would
become:
Device:/IDPMailSrvRule> add IDPRuleAction
Action=Protect
IDPServity=All
Signatures=68343
To specify a list which also includes signatures 68345 and 68349:
Device:/IDPMailSrvRule> add IDPRuleAction
Action=Protect
IDPServity=All
Signatures=68343,68345,68349
Individual signatures are entered in a similar way when using the Web Interface or InControl.
IDP Traffic Shaping
IDP offers an excellent means of identifying different types of traffic flow through cOS Core and
the applications responsible for them. This ability is combined with the traffic management
features of cOS Core to provide IDP Traffic Shaping which can place bandwidth and priority
restrictions on the specific flows identified.
The IDP traffic shaping feature is discussed in depth in Section 10.2, “IDP Traffic Shaping”.
6.5.8. Best Practice Deployment
IDP Deployment Recommendations
Chapter 6: Security Mechanisms
479