label | Description |
---|---|
General Settings | |
Enable | Click the switch to the right to activate the IPS feature which detects and prevents malicious or suspicious packets and responds instantaneously. |
Statistics | Click the switch to the right to have the Zyxel Device collect IPS statistics. All of the statistics are erased if you restart the Zyxel Device or click Flush Data in Security Statistics > IPS. |
Scan Mode | |
Prevention | Select this to have the Zyxel Device perform a user-specified action when a stream of data matches a malicious signature. |
Detection | Select this to have the Zyxel Device only create a log message when a stream of data matches a malicious signature. |
Query Signatures | |
Name | Type the name or part of the name of the signature(s) you want to find. |
Signature ID | Type the ID or part of the ID of the signature(s) you want to find. |
Advanced Settings | Configure these settings for more advanced queries. |
Severity | Search for signatures by severity level(s). Hold down the [Ctrl] key if you want to make multiple selections. These are the severities as defined in the Zyxel Device. The number in brackets is the number you use if using commands. Severe (16): These denote attacks that try to run arbitrary code or gain system privileges. High (8): These denote known serious vulnerabilities or attacks that are probably not false alarms. Medium (4): These denote medium threats, access control attacks or attacks that could be false alarms. Low (2): These denote mild threats or attacks that could be false alarms. Very-Low (1): These denote possible attacks caused by traffic such as Ping, trace route, ICMP queries etc. |
Classification | Search for signatures by attack type(s) . |
Platform | Search for signatures created to prevent intrusions targeting specific operating system(s). |
Service | Search for signatures by IPS service group(s). |
Action | Search for signatures by the response the Zyxel Device takes when a packet matches a signature. |
Activation | Search for activated and/or inactivated signatures here. |
Log | Search for signatures by log option here. |
Query Result | The results are displayed in a table showing the Status, SID, Name, Severity, Classification, Platform, Service, Log, and Action criteria as selected in the search. Click the SID column header to sort search results by signature ID. |
Rate Based Signature | IPS signatures identify traffic packets with suspicious malicious patterns. The Zyxel Device can then respond instantaneously according to the action you define. If you do not want the Zyxel Device to respond instantaneously for each suspicious packet detected, use rate based signatures to only respond after a number of occurrences (Count) within a certain time period (Period). See What You Need To Know for more information on rate based signatures. |
Edit | Select an entry and click Edit to modify the entry’s settings. |
Active | To turn on an entry, select it and click Activate. |
Inactive | To turn off an entry, select it and click Inactivate. |
Log | To edit an item’s log option, select it and use the Log icon. Select whether to have the Zyxel Device generate a log (log), log and alert (log alert) or neither (no) when a packet matches a signature. |
Action | To edit what action the Zyxel Device takes when a packet matches a signature, select the entry and use the Action icon. none: Select this action to have the Zyxel Device take no action when a packet matches a signature. drop: Select this action to have the Zyxel Device silently drop a packet that matches a signature. Neither sender nor receiver are notified. reject: Select this action to have the Zyxel Device send a reset to both the sender and receiver when a packet matches the signature. If it is a TCP attack packet, the Zyxel Device will send a packet with a ‘RST’ flag to the receiver and sender. If it is an ICMP or UDP attack packet, the Zyxel Device will send an ICMP unreachable packet. |
# | This is the entry’s index number in the list. |
Status | The activate (light bulb) icon is lit when the entry is active and dimmed when the entry is inactive. |
SID | SID is the signature ID that uniquely identifies a signature. Click the SID header to sort signatures in ascending or descending order. |
Name | This is the name of your rate-based signature. The name is the type of attack the Zyxel Device can identify. |
Severity | This field displays signatures by severity level(s). Hold down the [Ctrl] key if you want to make multiple selections. These are the severities as defined in the Zyxel Device. The number in brackets is the number you use if using commands. Severe (5): These denote attacks that try to run arbitrary code or gain system privileges. High (4): These denote known serious vulnerabilities or attacks that are probably not false alarms. Medium (3): These denote medium threats, access control attacks or attacks that could be false alarms. Low (2): These denote mild threats or attacks that could be false alarms. Very-Low (1): These denote possible attacks caused by traffic such as Ping, trace route, ICMP queries etc. |
Classification | This field displays signatures by attack types . |
Platform | This field displays signatures created to prevent intrusions targeting specific operating system(s). Hold down the [Ctrl] key if you want to make multiple selections. |
Service | This field displays signatures by IPS service group(s). Hold down the [Ctrl] key if you want to make multiple selections. |
Log | This fields displays the log action the Zyxel Device takes when a packet matches a signature. log- The Zyxel Device generates a log. log an alert- The Zyxel Device generates a log and alerts the users. no- The Zyxel Device will neither generate a log nor alert the users. |
Action | This field displays the response the Zyxel Device takes when a packet matches a signature. Hold down the [Ctrl] key if you want to make multiple selections. none: Select this action to have the Zyxel Device take no action when a packet matches a signature. drop: Select this action to have the Zyxel Device silently drop a packet that matches a signature. Neither sender nor receiver are notified. reject: Select this action to have the Zyxel Device send a reset to both the sender and receiver when a packet matches the signature. If it is a TCP attack packet, the Zyxel Device will send a packet with a ‘RST’ flag to the receiver and sender. If it is an ICMP or UDP attack packet, the Zyxel Device will send an ICMP unreachable packet. |
Period (sec) | Type the length of time in seconds the event should occur a Count number of times to trigger an IPS Action. For example, Count is set to 5, and Period is set to 60. If the Zyxel Device detects more than 5 occurrences of malicious traffic in less than 60 seconds, then an IPS Action is triggered. |
Count | Type the number of security events that need to occur within the defined Period in order to trigger an IPS Action. The allowed range is 1 to 300. |
Block Period | This field displays the time period the attacker’s IP will be blocked. Click on the number in this column to set the value from 0 to 86400 seconds. 0 means that the IP will not be blocked. |
Signature Information | The following fields display information on the current signature set that the Zyxel Device is using. |
Current Version | This field displays the IPS signature set version number. This number gets larger as the set is enhanced. |
Update Signatures | Click this link to go to the screen you can use to download signatures from the update server. |
Policy Type | Description |
---|---|
Any | Any attack includes all other kinds of attacks that are not specified in the policy such as password, spoof, hijack, phishing, and close-in. |
Misc | Miscellaneous attacks takes advantage of vulnerable computer networks and web servers by forcing cache servers or web browsers into disclosing user-specific information that might be sensitive and confidential. The most common type of Misc. attacks are HTTP Response Smuggling, HTTP Response Splitting and JSON Hijacking. |
Web-Attacks | Web attacks refer to attacks on web servers such as IIS (Internet Information Services). |
Buffer Overflow | A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. The excess information can overflow into adjacent buffers, corrupting or overwriting the valid data held in them. Intruders could run codes in the overflow buffer region to obtain control of the system, install a backdoor or use the victim to launch attacks on other devices. |
Backdoor/Trojan Horse | A backdoor (also called a trapdoor) is hidden software or a hardware mechanism that can be triggered to gain access to a program, online service or an entire computer system. A Trojan horse is a harmful program that is hidden inside apparently harmless programs or data. Although a virus, a worm and a Trojan are different types of attacks, they can be blended into one attack. For example, W32/Blaster and W32/Sasser are blended attacks that feature a combination of a worm and a Trojan. |
Access Control | Access control refers to procedures and controls that limit or detect access. Access control attacks try to bypass validation checks in order to access network resources such as servers, directories, and files. |
P2P | Peer-to-peer (P2P) is where computing devices link directly to each other and can directly initiate communication with each other; they do not need an intermediary. A device can be both the client and the server. In the Zyxel Device, P2P refers to peer-to-peer applications such as e-Mule, e-Donkey, BitTorrent, iMesh, etc. |
IM | IM (Instant Messenger) refers to chat applications. Chat is real-time, text-based communication between two or more users via networks-connected computers. After you enter a chat (or chat room), any room member can type a message that will appear on the monitors of all the other participants. |
Virus/Worm | A computer virus is a small program designed to corrupt and/or alter the operation of other legitimate programs. A worm is a program that is designed to copy itself from one computer to another on a network. A worm’s uncontrolled replication consumes system resources, thus slowing or stopping other tasks. |
BotNet | A Botnet is a number of Internet computers that have been set up to forward transmissions including spam or viruses to other computers on the Internet though their owners are unaware of it. It is also a collection of Internet-connected programs communicating with other similar programs in order to perform tasks and participate in distributed Denial-Of-Service attacks. |
DoS-DDoS | The goal of Denial of Service (DoS) attacks is not to steal information, but to disable a device or network on the Internet. A Distributed Denial of Service (DDoS) attack is one in which multiple compromised systems attack a single target, thereby causing denial of service for users of the targeted system. |
Scan | A scan describes the action of searching a network for an exposed service. An attack may then occur once a vulnerability has been found. Scans occur on several network levels. A network scan occurs at layer-3. For example, an attacker looks for network devices such as a router or server running in an IP network. A scan on a protocol is commonly referred to as a layer-4 scan. For example, once an attacker has found a live end system, he looks for open ports. A scan on a service is commonly referred to a layer-7 scan. For example, once an attacker has found an open port, say port 80 on a server, he determines that it is a HTTP service run by some web server application. He then uses a web vulnerability scanner (for example, Nikto) to look for documented vulnerabilities. |
File Transfer | File transfer is a protocol to transfer files over the Internet. An attack may then occur if you’re transferring files over an unsecured connection. Personal data stored in the files uploaded can also be easily accessed by attackers if these files are not encrypted. |
Mail | A Mail or email bombing attack involves sending several thousand identical messages to an electronic mailbox in order to overflow it, making it unusable. |
Stream Media | A Stream Media attack occurs when a malicious network node downloads an overwhelming amount of media stream data that could potentially exhaust the entire system. This method allows users to send small requests messages that result in the streaming of large media objects, providing an opportunity for malicious users to exhaust resources in the system with little effort expended on their part. |
Tunnel | A Tunneling attack involves sending IPv6 traffic over IPv4, slipping viruses, worms and spyware through the network using secret tunnels. This method infiltrates standard security measures through IPv6 tunnels, passing through IPv4 undetected. An external signal then triggers the malware to spring to life and wreak havoc from inside the network. |
ACL | This attack is a violation of an ACL (Access Control List) rule. These are packet filter rules that check source, destination IP addresses / ports, and routing information in the packet. |
WEB_PHP | WEB_MISC | WEB_IIS | WEB_FRONTPAGE |
WEB_CGI | WEB_ATTACKS | TFTP | TELNET |
SQL | SNMP | SMTP | RSERVICES |
RPC | POP3 | POP2 | P2P |
ORACLE | NNTP | NETBIOS | MYSQL |
MISC_EXPLOIT | MISC_DDOS | MISC_BACKDOOR | MISC |
IMAP | IM | ICMP | FTP |
FINGER | DNS | n/a |
LABEL | Description |
---|---|
Rule Summary | |
Add | Click this to create a new entry. |
Edit | Select an entry and click this to be able to modify it. |
Remove | Select an entry and click this to delete it. |
# | This is the entry’s index number in the list. |
Signature ID | This field displays the signature ID of this entry. |
Signature Name | This field displays the signature name of this entry. |