User`s guide
1.
2.
3.
4.
5.
1.
2.
3.
1.
2.
3.
4.
Available settings include:Action
– Blocks network traffic where malicious activities were detected.Drop
– Reports Log Only network traffic where malicious activities were detected.
– No action is taken.None
Available settings include: Log
Alert
Warn
Notice
You can view detected threats on the page.BASIC > IPS Events
Step 3. Configure IPS in Firewall Rules
To configure IPS in a firewall rule:
Go to the page.FIREWALL > Firewall Rules
Open an existing rule or create a new one.
In the window, click the tab.Add/Edit Access Rule Advanced
Next to , select an option to disable or enable IPS:Intrusion Prevention
Default (Report Mode or Enforce Mode) – Applies the default IPS policy to the rule.
Disabled – Disables IPS scanning for the rule.
Click .Save
Configure IPS Exceptions
If you must allow network traffic that the Barracuda Firewall has detected as a threat, you can create an IPS exception.
Before you create the IPS exception, get the description or CVE-ID of the threat:
Go to the page.BASIC > IPS Events
Browse through the list of detected threats or apply filters to locate specific entries.
Get the attack description text in the column, or, if available, the CVE-ID of the detected threat.Info
To create the IPS exception:
Go to the page.ADVANCED > IPS Exceptions
Click .Add IPS Exception
In the window, specify the traffic to be handled and the action to be performed by the exceptionIPS Exceptions .
Click .Add
How to Control Traffic for Applications