D-Link DFL-260E CLI Guide for DFL-260E - Page 117

IDPRuleAction

Page 117 highlights

3.24. IDPRule Chapter 3. Configuration Reference 3.24. IDPRule Description An IDP Rule defines a filter for matching specific network traffic. When the filter criterion is met, the IDP Rule Actions are evaluated and possible actions taken. Properties Index Name SourceInterface SourceNetwork DestinationInterface DestinationNetwork Service Schedule InsertionEvasion URIIllegalUTF8 URIIllegalHex URIDoubleEncode Comments The index of the object, starting at 1. (Identifier) Specifies a symbolic name for the rule. (Optional) Specifies the name of the receiving interface to be compared to the received packet. Specifies the sender span of IP addresses to be compared to the received packet. Specifies the the destination interface to be compared to the received packet. Specifies the span of IP addresses to be compared to the destination IP of the received packet. Specifies a service that will be used as a filter parameter when matching traffic with this rule. By adding a schedule to a rule, the security gateway will only allow that rule to trigger at those designated times. (Optional) Protect against insertion/evastion attacks. (Default: Yes) Specifies what action to take if invalid UTF-8 characters are seen in a HTTP URI. (Default: Log) Specifies what action to take when invalid hexencoding (%xx) is seen in a HTTP URI. (Default: DropLog) Specifies what action to take when seeing double encoded characters in a HTTP URI. (Default: Ignore) Text describing the current object. (Optional) Note If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list. 3.24.1. IDPRuleAction Description 117

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198

3.24. IDPRule
Description
An IDP Rule defines a filter for matching specific network traffic. When the filter criterion is met,
the IDP Rule Actions are evaluated and possible actions taken.
Properties
Index
The index of the object, starting at 1. (Identifier)
Name
Specifies a symbolic name for the rule. (Optional)
SourceInterface
Specifies the name of the receiving interface to be
compared to the received packet.
SourceNetwork
Specifies the sender span of IP addresses to be com-
pared to the received packet.
DestinationInterface
Specifies the the destination interface to be com-
pared to the received packet.
DestinationNetwork
Specifies the span of IP addresses to be compared to
the destination IP of the received packet.
Service
Specifies a service that will be used as a filter para-
meter when matching traffic with this rule.
Schedule
By adding a schedule to a rule, the security gateway
will only allow that rule to trigger at those desig-
nated times. (Optional)
InsertionEvasion
Protect against insertion/evastion attacks. (Default:
Yes)
URIIllegalUTF8
Specifies what action to take if invalid UTF-8 char-
acters are seen in a HTTP URI. (Default: Log)
URIIllegalHex
Specifies what action to take when invalid hexen-
coding (%xx) is seen in a HTTP URI. (Default:
DropLog)
URIDoubleEncode
Specifies what action to take when seeing double en-
coded characters in a HTTP URI. (Default: Ignore)
Comments
Text describing the current object. (Optional)
Note
If no
Index
is specified when creating an instance of this type, the object will be
placed last in the list and the
Index
will be equal to the length of the list.
3.24.1. IDPRuleAction
Description
3.24. IDPRule
Chapter 3. Configuration Reference
117