McAfee M-1250 IPS Configuration Guide - Page 174

For more information, see Customizing Denial of Service DoS

Page 174 highlights

McAfee® Network Security Platform 5.1 The IPS Sensor_Name node traffic. The short-term profile is compared to the long-term profile and an alert is raised if the short-term statistics indicates a traffic surge that deviates too much from the long-term behavior. For Threshold Mode, the Sensor keeps track of the threshold limits you enabled for specific attacks. Together these two modes create one profile, which is saved to your Sensor's flash and can be uploaded to the Manager for future re-use. You can upload this saved profile later if you feel the baseline that had previously been created was more effective than a current profile. For more information, see Customizing Denial of Service (DoS) modes (on page 23). Note: DoS Copy feature is not supported on M-series and N-450 Sensors. To manage the DoS learning mode policies on a Sensor, do the following: 1 Click IPS Settings/Sensor_Name > Advanced Scanning > DoS Profiles (IPS Settings/Failover Pair Node/Sensor_Name > DoS Management > DoS Profiles in the case of a failover pair Sensor). The last DoS profile uploaded from the Sensor to Manager is listed under DoS Profiles Uploaded from Sensor to Manager. 2 Select one action from one of the following headings: Sensor DoS Profile Actions Re-learn Profile: restarts the learning process. The profile that has just been learned is erased, and a new profile is built. To start the re-learning process, select this option and click Update. Force Sensor into detection mode: activates Learning Mode detection for a Sensor without waiting the entire 48-hour learning time. Tip: McAfee recommends performing a "re-learn profile" when there is a network change (that is, moved Sensor from a lab environment to a production environment) or configuration change (changed the CIDR block of a subinterface) that causes a significant sudden traffic change to an interface/subinterface for which a profile has already been established (or in the process of initial learning). Without doing so, the Sensor may give false alarms or fail to detect attacks during a time period when it is adapting to the new network traffic conditions. 166

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259

McAfee® Network Security Platform 5.1
The IPS Sensor_Name node
166
traffic. The short-term profile is compared to the long-term profile and an alert is raised if
the short-term statistics indicates a traffic surge that deviates too much from the long-term
behavior.
For
Threshold Mode
, the Sensor keeps track of the threshold limits you enabled for specific
attacks. Together these two modes create one profile, which is saved to your Sensor’s
flash and can be uploaded to the Manager for future re-use. You can upload this saved
profile later if you feel the baseline that had previously been created was more effective
than a current profile.
For more information, see Customizing Denial of Service (DoS)
modes (on page
23
).
Note:
DoS Copy feature is not supported on M-series and N-450 Sensors.
To manage the DoS learning mode policies on a Sensor, do the following:
1
Click
IPS Settings
/
Sensor_Name > Advanced Scanning > DoS Profiles
(
IPS Settings
/
Failover Pair
Node
/
Sensor_Name > DoS Management > DoS Profiles
in the case of a failover pair Sensor).
The last DoS profile uploaded from the Sensor to Manager is listed under
DoS Profiles
Uploaded from Sensor to Manager
.
2
Select one action from one of the following headings:
Sensor DoS Profile Actions
±
Re-learn Profile
: restarts the learning process. The profile that has just been learned
is erased, and a new profile is built. To start the re-learning process, select this
option and click
Update
.
±
Force Sensor into detection mode
: activates Learning Mode detection for a Sensor
without waiting the entire 48-hour learning time.
Tip:
McAfee recommends performing a “re-learn profile” when there is a
network change (that is, moved Sensor from a lab environment to a production
environment) or configuration change (changed the CIDR block of a sub-
interface) that causes a significant sudden traffic change to an interface/sub-
interface for which a profile has already been established (or in the process of
initial learning). Without doing so, the Sensor may give false alarms or fail to
detect attacks during a time period when it is adapting to the new network traffic
conditions.