Pardon the basic question but we're coming from an environment that is set up differently and are considering XG with network IPS. Our current config uses a traditional firewall which receives "shun" style blocks from an IDS as opposed to (inline) IPS. Within the environment we have web servers in the DMZ which serve "origin" content through to a content distribution network which acts as a reverse proxy for our public sites. Consequently, for network traffic into the DMZ web servers that has an IDS signature hit, if our policy were set up to simply "shun" the offending "source" IP of the request (which is the proxy node in the CDN) as opposed to the "True Client IP", we'd shoot ourselves in the foot.
If we move to using inline IPS with XG, is it possible to set the policy such that it performs a session drop or other similar action based on the "true client IP", if the traffic involves an inbound web request to the DMZ? Or what is the best practice to avoid issues with traffic that flows through from the CDN reverse proxy? We don't want to inadvertently block "clean" traffic just because we're reverse proxying, and even though we will also utilize WAF, we don't want to leave http/https inbound traffic simply uninspected via IPS. Is the alternative, simpler answer to just have the policy set up to do a reset as the action? Open to better ideas and hopefully the explanation is clear. Thanks so much in advance for your help/guidance.
This thread was automatically locked due to age.