
Chapter 3 IPS Filtering
20 X Family LSM User’s Guide V 2.5.1
For additional information, see the following topics:
• “Security Profile Details” on page 20
• “Create a Security Profile” on page 21
• “Edit a Security Profile” on page 22
• “View DV Filters” on page 26
• “Edit DV Filter Category Settings” on page 29
• “Port Scan/Host Sweep Filters” on page 35
Security Profile Details
The following table describes the information available on the Security Profiles page.
Override global filter
settings (create filter
level settings)
On the Edit Security Profile page in the Profile Details (Advanced)
Filters section, click Search Filters. On the Search Filters page,
locate the filter to override. Click the + icon to add the filter to the
Security Profile. Then, edit the filter to customize the settings.
Restore filter to global
category settings
(Delete filter override)
On the Edit Security Profile page in the Profile Details (Advanced)
Filters section, locate the filter override to delete. Then, click .
Edit Port Scan/Host
Sweep Filters
The Port Scan/Host Sweep filters are a special type of filter used to
protect the network against Port Scan/Host Sweep attacks. These
filters can only be applied to Security Zones that include physical
ports. For additional information on these filters, see “
Port Scan/
Host Sweep Filters” on page 35.
Table 3–2: Security Profile Details
Parameter Description
Current Profiles: This section lists all the Security Profiles currently configured on the X family
device.
Profile Name The name assigned to the Security Profile. The Default Security Profile is
pre-configured on the device. You can customize this profile to add Security
Zone pairs or modify global and individual filter settings, but you cannot
delete or rename this profile.
Description Displays the description entered for the Security Profile if any exists.
Function(s) The functions available to manage Security Profiles:
• Edit the Security Profile to configure security zones, Category Settings,
filter overrides, or global limits and exceptions
• Delete the Security Profile.
Table 3–1: Security Profile Tasks (Continued)
Task Procedure
Komentarze do niniejszej Instrukcji