Hi all,
I am currently working on an optimization of our IPS configuration.
We started with IPS in Version R77, so every Firewall Gateway got its own IPS profile. For reducing false postitives or disabling IPS on irrelevant network traffic, so far, we have defined Exceptions either for a single protection or for the hole IPS blade (if necessary).
After the update to R80, we got the recommendation to use different profiles in separate Threat Prevention Rules within a firewall gateway to increase performance (especially of the gateway, but also for the application and the correspondent network traffic).
My first thought was, that it would be useful to build an IPS Profile based on the used protocol. For example to create a specific IPS profile for e.g. incoming SSL traffic with a small amount of relevant protections, which I use in a separate Threat Prevention Rules.
After reading Secure Knowledge sk95193: ATRG IPS, I am not sure, if this is a method to increase performance effectively.
Quote: "The Context Management Infrastructure (CMI) is the "brain" of the IPS. It coordinates different components, decides which protections should run on a certain packet, decides the final action to be performed on the packet and issues an event log (.....) CMI is a way to connect and manage parsers and protections. Since they are separated, protections can be added in updates, while performance does not depend on the number of active protections."
In my opinion, it seems that an separate profile for e.g. SSL or other known protocols (HTTP, SMTP,..) isn't an appropriate way to decrease cpu usage, because the amount of protection isn't relevant. Is this the right conclusion?
So for me, what would be a use case for separate IPS profiles? Just for activate additional blades like ABOT or Threat Emulation? What is an effective method to increase performance of a firewall gateway with IPS instead, without diabling IPS for a specific communication.
Best regards
Jens