HP VPN Firewall Appliances Attack Protection Configuration Guide
133
Hardware IPS com
p
atibilit
y
F100-C-G/F100-S-G Yes
F100-M-G/F100-A-G/F100-E-G Yes
F5000-A5 No
F5000-S/F5000-C No
Firewall modules No
U200-A/U200-M/U200-CA Yes
U200-S/U200-CS/U200-CM Yes
Overview
The IPS typically runs on a network trunk. Based on IPS policies, IPS can implement real-time traffic
analysis and anomaly detection, and trigger predefined actions in response. For example, IPS can block
abnormal traffic to prevent suspicious codes from being injected into target hosts and executed.
Recommended configuration procedure
Ste
p
Remarks
1. Configuring IPS log output
parameters
Optional.
Specify whether to send logs to remote log hosts and whether to send logs
through emails.
By default, logs are not sent to remote log hosts and are not sent through
emails.
2. Creating an IPS policy
Required.
No IPS policy exists by default.
3. Applying an IPS policy
Required.
No IP
S policy is applied by default.
Configuring IPS log output parameters
1. Select Advanced Security Prevention > IPS from the navigation tree.
The IPS Policies tab is displayed, as shown in Figure 113.