McAfee M-1250 IPS Configuration Guide - Page 122

Considerations for IPS Quarantine rule creation

Page 122 highlights

McAfee® Network Security Platform 5.1 Managing IPS settings Figure 122: Configure Attack Detail page 7 Select the drop-down list, at the top right corner of the Configure Attack Detail page. Figure 123: Search option for selecting attacks eligible for IPS Quarantine 8 To list the attacks which are eligible for IPS Quarantine, select Attacks Eligible for IPS Quarantine from the drop-down list. The Configure Attack Detail page automatically refreshes, and displays the attacks eligible for IPS Quarantine for the selected protocol. 9 Configure the IPS Quarantine/McAfee NAC sections as described in Enabling IPS Quarantine in IPS Policy Editor (on page 109). Considerations for IPS Quarantine rule creation IPS Quarantine rule creation exceptions IPS quarantine actions are ignored even if these are enabled at the policy and port level if: • The host IP has been added or if it is part of the exclusion list that was configured from the Manager. The exclusion list can be configured as an IP CIDR or a specific IP address. If the source IP generating the attack is a part of the NAC exclusion list, then this indicates that the host is trusted and hence would not get quarantined. • An alert filter has been configured, which prevents the alert from being raised for a detected attack. Thus if the alert filter sorts the alert, the IPS quarantine action is not executed for this attack, and the source IP is not quarantined. IPS quarantine ACLs and traditional ACLs IPS quarantine ACLs are configured to the IPS Quarantine Network Access Zone (NAZ). These ACLs monitor traffic from an IPS quarantined host. Traditional ACLs are configured to monitor traffic in inline mode on the Network Security Platform. Review the following to understand the interaction between IPS Quarantine and traditional ACLs: 114

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259

McAfee® Network Security Platform 5.1
Managing IPS settings
114
Figure 122: Configure Attack Detail page
7
Select the drop-down list, at the top right corner of the
Configure Attack Detail
page.
Figure 123: Search option for selecting attacks eligible for IPS Quarantine
8
To list the attacks which are eligible for IPS Quarantine, select
Attacks Eligible for IPS
Quarantine
from the drop-down list.
The
Configure Attack Detail
page automatically refreshes, and displays the attacks
eligible for IPS Quarantine for the selected protocol.
9
Configure the IPS Quarantine/McAfee NAC sections as described in Enabling IPS
Quarantine in IPS Policy Editor (on page
109
).
Considerations for IPS Quarantine rule creation
IPS Quarantine rule creation exceptions
IPS quarantine actions are ignored even if these are enabled at the policy and port level if:
The host IP has been added or if it is part of the exclusion list that was configured
from the Manager. The exclusion list can be configured as an IP CIDR or a specific IP
address. If the source IP generating the attack is a part of the NAC exclusion list, then
this indicates that the host is trusted and hence would not get quarantined.
An alert filter has been configured, which prevents the alert from being raised for a
detected attack. Thus if the alert filter sorts the alert, the IPS quarantine action is not
executed for this attack, and the source IP is not quarantined.
IPS quarantine ACLs and traditional ACLs
IPS quarantine ACLs are configured to the IPS Quarantine Network Access Zone (NAZ).
These ACLs monitor traffic from an IPS quarantined host. Traditional ACLs are configured
to monitor traffic in inline mode on the Network Security Platform.
Review the following to understand the interaction between IPS Quarantine and traditional
ACLs: