Configuring IDS Policies
An IDS Policy is configured using two tables with "parent-child" type relationship:
■ | IDS Policies table ("parent"): Defines a name and provides a description for the IDS Policy. You can configure up to 20 IDS Policies. |
■ | IDS Rules table ("child"): Defines the actual rules for the IDS Policy. Each IDS Policy can be configured with up to 20 rules. |
A maximum of 100 IDS rules can be configured (regardless of how many rules are assigned to each policy).
The device provides the following pre-configured IDS Policies that can be used in your deployment (if they meet your requirements):
■ | "DEFAULT_FEU": IDS Policy for far-end users in the WAN |
■ | "DEFAULT_PROXY": IDS Policy for proxy server |
■ | "DEFAULT_GLOBAL": IDS Policy with global thresholds |
● | You can edit and delete the default IDS Policies. |
● | If the IDS Policies table is empty (i.e., you have deleted all IDS Policies) and you want to return the default IDS Policies, disable IDS and then enable it again. |
The following procedure describes how to configure IDS Policies through the Web interface. You can also configure it through ini file or CLI:
■ | IDS Policy table: IDSPolicy (ini file) or configure voip > ids policy (CLI) |
■ | IDS Rules table: IDSRule (ini file) or configure voip > ids rule (CLI) |
➢ | To configure an IDS Policy: |
1. | Open the IDS Policies table (Setup menu > Signaling & Media tab > Intrusion Detection folder > IDS Policies); the table displays the pre-configured IDS policies: |
2. | Click New; the following dialog box appears: |
3. | Configure an IDS Policy name according to the parameters described in the table below. |
4. | Click Apply. |
IDS Policies Table Parameter Descriptions
Parameter |
Description |
---|---|
'Index' policy [IDSPolicy_Index] |
Defines an index number for the new table row. Note: Each row must be configured with a unique index. |
'Name' rule [IDSPolicy_Name] |
Defines a descriptive name, which is used when associating the row in other tables. The valid value is a string of up to 40 characters. Note: The parameter value cannot contain a forward slash (/). |
'Description' description [IDSPolicy_Description] |
Defines a brief description for the IDS Policy. The valid value is a string of up to 100 characters. |
5. | In the IDS Policies table, select the required IDS Policy row, and then click the IDS Rule link located below the table; the IDS Rule table opens. |
6. | Click New; the following dialog box appears: |
The figure above shows a configuration example: If 15 malformed SIP messages ('Reason') are received within a period of 30 seconds ('Threshold Window'), a minor alarm is sent ('Minor-Alarm Threshold'). Every 30 seconds, the rule’s counters are cleared ('Threshold Window'). If more than 25 malformed SIP messages are received within this period, the device blacklists for 60 seconds the remote IP host ('Deny Threshold') from where the messages were received.
7. | Configure an IDS Rule according to the parameters described in the table below. |
8. | Click Apply, and then save your settings to flash memory. |
IDS Rule Table Parameter Descriptions
Parameter |
Description |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
General | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
'Index' rule-id [IDSRule_RuleID] |
Defines an index number for the new table record. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
'Reason' reason [IDSRule_Reason] |
Defines the type of intrusion attack (malicious event).
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
'Threshold Scope' threshold-scope [IDSRule_ThresholdScope] |
Defines the source of the attacker to consider in the device's detection count.
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
'Threshold Window' threshold-window [IDSRule_ThresholdWindow] |
Defines the threshold interval (in seconds) during which the device counts the attacks to check if a threshold is crossed. The counter is automatically reset at the end of the interval. The valid range is 1 to 1,000,000. The default is 1. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Alarms |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
'Minor-Alarm Threshold' minor-alrm-thr [IDSRule_MinorAlarmThreshold] |
Defines the threshold that if crossed a minor severity alarm is sent. The valid range is 1 to 1,000,000. A value of 0 or -1 means not defined. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
'Major-Alarm Threshold' major-alrm-thr [IDSRule_MajorAlarmThreshold] |
Defines the threshold that if crossed a major severity alarm is sent. The valid range is 1 to 1,000,000. A value of 0 or -1 means not defined. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
'Critical-Alarm Threshold' critical-alrm-thr [IDSRule_CriticalAlarmThreshold] |
Defines the threshold that if crossed a critical severity alarm is sent. The valid range is 1 to 1,000,000. A value of 0 or -1 means not defined. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Deny |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
'Deny Threshold' deny-thr [IDSRule_DenyThreshold] |
Defines the threshold that if crossed, the device blocks (blacklists) the remote host (attacker). The default is -1 (i.e., not configured). Note: The parameter is applicable only if the 'Threshold Scope' parameter is set to IP or IP+Port. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
'Deny Period' deny-period [IDSRule_DenyPeriod] |
Defines the duration (in sec) to keep the attacker on the blacklist, if configured using the 'Deny Threshold' parameter. The valid range is 0 to 1,000,000. The default is -1 (i.e., not configured). Note: The parameter is applicable only if the 'Threshold Scope' parameter is set to IP or IP+Port. |