Install a predefined policy on IPS engines and Layer 2 Firewalls
To be able to inspect traffic, the NGFW Engine must have a policy installed. Installing a predefined policy provides an easy way to begin using the system. You can then fine-tune the policy as needed.
Element type | Default element name | Description |
---|---|---|
IPS Template Policy | High-Security IPS Template |
IPS Template Policy that uses Inspection rules from the High-Security Inspection Template. A Template Policy containing the predefined Access rules necessary for the IPS engine to communicate with the SMC and some external components. The High-Security IPS Template Policy provides an easy starting point for determining what kinds of rules your system needs. |
Medium-Security IPS Template | IPS Template Policy that uses Inspection rules from the Medium-Security Inspection Policy. | |
IPS Policy | Customized High-Security Inspection IPS Policy | Example of a customized IPS Policy that uses Inspection rules from the Customized High-Security Inspection Template. Used in testing Forcepoint NGFW in the IPS role at ICSA Labs and NSS Labs. |
Default IPS Policy |
Basic IPS Policy that uses Inspection rules from the High-Security Inspection Template. Can be used as a starting point for creating a customized IPS Policy. The Default IPS Policy does not add any rules to the rules defined in the IPS Template. It allows you to install the predefined rules in the IPS Template on the IPS engine right after installation. (Template Policies cannot be installed on the NGFW Engine.) |
|
Layer 2 Firewall Template Policy | Layer 2 Firewall Template |
A Template Policy that contains the predefined Access rules necessary for the Layer 2 Firewall to communicate with the SMC and some external components. The Layer 2 Firewall Template uses Inspection rules from the No Inspection Policy. The rules in the No Inspection Policy do not enforce inspection. |
Layer 2 Firewall Inspection Template |
A Template Policy that is based on the Layer 2 Firewall Template. The Layer 2 Firewall Inspection Template uses Inspection rules from the High-Security Inspection Template. The Layer 2 Firewall Inspection Template enables deep inspection for all traffic. |
|
Inspection Policy | No Inspection Policy | Suitable for Firewall deployments, in which only packet filtering is needed. Disables deep packet inspection. |
Medium-Security Inspection Template | For Firewalls, Layer 2 Firewalls, inline IPS deployments in asymmetrically routed networks, and IPS deployments in IDS mode. Terminates reliably identified attacks and logs Situations that have some degree of inaccuracy. Low risk of false positives. | |
High-Security Inspection Template | For Firewall, Layer 2 Firewall, and inline IPS use. Extended inspection coverage and evasion protection. Not for asymmetrically routed networks. Terminates reliably identified attacks, and Situations that have some inaccuracy. Moderate false positive risk. | |
Customized High-Security Inspection Policy | This policy is an example of a highly customized Inspection Policy for network environments in which unconditional inspection coverage and evasion protection are required. The risk of false positives is high in production use. |
The default policy elements might change when you import and activate a dynamic update package. You cannot modify any of the default policy elements, but you can make your own policies based on a copy of a default policy. For more information, see the Forcepoint Next Generation Firewall Product Guide.
For more details about the product and how to configure features, click Help or press F1.