SV-80925r1_rule
V-66435
SRG-NET-000249-IDPS-00176
JUSX-IP-000028
CAT II
10
This requirement can be met through a custom rule within a policy or drop action option on the zone configuration to which the policy is applied. The following is an example of the command that can be added to the IDP policy. The policy is called Malicious-Activity and the rule is called R1 in this example.
[edit]
set security idp idp-policy Malicious-Activity rulebase-ips rule R1 then action drop-connection
Verify custom rules exist to drop packets or terminate sessions upon detection of malicious code.
[edit]
show security idp policy
View the rulebase action option for the IDP policies.
If rulebases for IDP policies which detect malicious code are not configured with an action of Drop-Packet, Drop-Connection, or some form of session termination, this is a finding.
V-66435
False
JUSX-IP-000028
Verify custom rules exist to drop packets or terminate sessions upon detection of malicious code.
[edit]
show security idp policy
View the rulebase action option for the IDP policies.
If rulebases for IDP policies which detect malicious code are not configured with an action of Drop-Packet, Drop-Connection, or some form of session termination, this is a finding.
M
3037