SonicOS 7.0 Objects

Intrusion Prevention

An Intrusion Prevention System (IPS) is a threat detection method to detect and prevent identified threats. IPS continuously monitors the network to identify the possible malicious incidents and captures information about the identified incidents. The IPS takes preventative action to prevent future attacks.

In this section, you can create Intrusion Prevention Action Profile to be used along with the Intrusion Prevention profiles created on OBJECT | Profile Objects > Intrusion Prevention > Intrusion Prevention Profiles page.

To configure a custom Intrusion Prevention Action Profile

  1. Navigate to OBJECT | Action Profiles > Security Action Profile.
  2. Do one of the following:

    • Add a new Security Action Profile.

      1. Click the Add icon.
      2. Enter an Action Profile Name.
    • Edit an existing Security Action Profile.

      Hover over an existing Security Action Profile and click the Edit icon.

  3. Click the Intrusion Prevention tab.

  4. Enable Intrusion Prevention to enable the SonicWall Threat Prevention Service (IPS).
  5. Select the Threat Profile to be used to build an action profile.

    Global Settings

    To apply the rules defined by SonicOS. Go to step 7 if you select Global Settings.

    Profile Settings

    To customize the rules for a specific requirement. Skip step 7 if you select Profile Settings.

  6. Select the profile to be applied to Prevent and Log from the respective drop-down menus. These options are not available if you set the Intrusion Prevention Profile as Global Settings.

    Prevent To restrict the transfer of files with specific attributes. Enabling Prevent restricts data file transfers for each protocol, except the TCP Stream.
    Log To keep a record of your SonicWallIntrusion Prevention traffic.

    You can select the default or custom Profiles created on OBJECT | Profile Objects > Intrusion Prevention > Intrusion Prevention Profiles page. For more information, refer to Adding Intrusion Prevention Profiles.

  7. Set the Redundancy Filter value in seconds for how long to use these filters.
  8. Select the Low, Medium, and High Priority/Risk options based on your needs to Prevent, Log, and for how long to use the Redundancy Filters.

    Low, Medium, and High Priority/Risk options are not available if you select Profile Settings because your Intrusion Prevention Profile addresses those capabilities.

  9. Click Save.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden