McAfee M-1250 IPS Configuration Guide - Page 173

Managing DoS Learning Mode profiles, Group Name, Primary Interface, Delete, Save., DoS Profiles

Page 173 highlights

McAfee® Network Security Platform 5.1 The IPS Sensor_Name node 2 Click Add. 3 Type a Group Name. 4 Select a Primary Interface from the drop-down list. The primary interface may be a port pair (1A and 1B) or a single port (3B). The primary interface determines the policy that is enforced by the group. Note: An interface changed from Dedicated to VLAN or CIDR traffic types is not eligible for interface group combination until VLAN or CIDR IDs are added. 5 Click Next. Figure 176: Interface Group Creation 6 Select interfaces to add to the group. The primary is shown. 7 Click Add. Click Delete to remove any unwanted interfaces. 8 If interfaces are functioning as a port pair, they cannot be separated within an interface group. Figure 177: Add Interfaces To Interface Group 9 Click Save. 10 Download the changes to your Sensor by performing the steps in Updating the configuration of a Sensor. Managing DoS Learning Mode profiles The DoS Profiles action configures the DoS learning mode profile to restart or load from a previous profile. Denial of service (DoS) attacks interrupt network services by flooding a system or host with spurious traffic, which can overflow your system buffers and force you to take the system offline for repairs. Since a DoS profile can be configured for both learning and threshold modes, the Sensor keeps statistics for both modes. For Learning Mode, the Sensor monitors the network traffic and develops a "normal" baseline profile, called a long-term profile, by collecting statistics on a number of traffic measures over time. The initial learning time for the profile is typically two days. After that time, the system constantly updates this profile, which is kept on the internal Sensor flash, to keep an updated picture of the network. In real time, the Sensor develops a short-term profile, which is like an instant snapshot of the network 165

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259

McAfee® Network Security Platform 5.1
The IPS Sensor_Name node
165
2
Click
Add
.
3
Type a
Group Name
.
4
Select a
Primary Interface
from the drop-down list. The primary interface may be a port
pair (1A and 1B) or a single port (3B). The primary interface determines the policy that
is enforced by the group.
Note:
An interface changed from Dedicated to VLAN or CIDR traffic types is
not eligible for interface group combination until VLAN or CIDR IDs are added.
5
Click
Next
.
Figure 176: Interface Group Creation
6
Select interfaces to add to the group. The primary is shown.
7
Click
Add
. Click
Delete
to remove any unwanted interfaces.
8
If interfaces are functioning as a port pair, they cannot be separated within an
interface group.
Figure 177: Add Interfaces To Interface Group
9
Click
Save.
10
Download the changes to your Sensor by performing the steps in Updating the
configuration of a Sensor.
Managing DoS Learning Mode profiles
The
DoS Profiles
action configures the DoS learning mode profile to restart or load from a
previous profile. Denial of service (DoS) attacks interrupt network services by flooding a
system or host with spurious traffic, which can overflow your system buffers and force you
to take the system offline for repairs.
Since a DoS profile can be configured for both learning and threshold modes, the Sensor
keeps statistics for both modes. For
Learning Mode
, the Sensor monitors the network traffic
and develops a “normal” baseline profile, called a
long-term profile
, by collecting statistics
on a number of traffic measures over time. The initial learning time for the profile is
typically two days. After that time, the system constantly updates this profile, which is kept
on the internal Sensor flash, to keep an updated picture of the network. In real time, the
Sensor develops a short-term profile, which is like an instant snapshot of the network