This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Please clarify IPS Policies?

I see these 10 IPS Policies available with very minimal description for what they do, what situation they apply to, and their relative “strengths”.  I assume strict is stronger than general.

1. DMZ TO LAN

2. DMZ TO WAN

3. LAN TO DMZ

4. LAN TO WAN

5. WAN TO DMZ

6. WAN TO LAN

7. generalpolicy

8. lantowan strict policy

9. lantowan general policy

10. dmzpolicy

Are the Policies directionally dependent , meaning LAN to WAN differs from WAN to LAN?  How?  I have seen other posts saying the source and destination Zones do not matter as the reverse traffic is also checked according to the policy.  Is this true, which would imply LAN to WAN and WAN to LAN are identical?

Do I need two firewall rules one applying WAN TO LAN and the other LAN TO WAN?

What is the difference between lantowan general policy and LAN to WAN?

What is the security level of generalpolicy relative to the others?

The Wizard created a default firewall rule using generalpolicy.  Does that mean it is “good enough” for general use?

I have one web server in LAN exposed by a DNAT rule and chose to apply WAN TO LAN in that rule; however, I don’t know if that is the best choice.  Is it actually doing anything with generalpolicy in the preceeding firewall rule?

I have seen several posts saying descriptions of these policies would be forthcoming, but I can’t find such a thing.  I hope someone can and will do it in response.



This thread was automatically locked due to age.
Parents
  • I ended up just creating my own policy. The “lantowan_general”, “lantowan_strict”, “general policy” and “dmzpolicy” seem to be identical as far as I can tell. They apply to all categories, all severity, all platforms and all targets (7158 rules). I’m not sure if these are just placeholders and the plan was to update them in the future. Hopefully someone from Sophos can shed some light on this topic.

    The custom policy I created is based on:

    - Protect everything connected to my home network.

    - I don’t have any devices running Windows or Solaris.

    - I am not running any servers, database management systems, industrial control systems or ERP systems.

    This significantly reduced the number of rules to 1520. It doesn’t seem to make any difference with bandwidth though, still seeing about 300Mbps with IPS enabled compared to 900Mbps with IPS off.

    Here’s a screenshot of my custom policy:

  • Hi Shred,

    when you review the DOS attacks tab what if any do you see as being dropped?

    Ian

  • None. I don’t have DoS setup/configured. The only three options I have enabled under DoS settings are:

    - Dropped Source Routed Packet (enabled by default)

    - Disable ICMP/ICMPv6 Redirect Packet (enabled by default)

    - ARP Hardening (not enabled by default)

    I’m not sure how to setup DoS and Spoof Protection for home use.

    My understanding is the DoS attacks tab has nothing to do with IPS policies but  the entire ‘Intrusion Prevention’ page layout is confusing...

Reply
  • None. I don’t have DoS setup/configured. The only three options I have enabled under DoS settings are:

    - Dropped Source Routed Packet (enabled by default)

    - Disable ICMP/ICMPv6 Redirect Packet (enabled by default)

    - ARP Hardening (not enabled by default)

    I’m not sure how to setup DoS and Spoof Protection for home use.

    My understanding is the DoS attacks tab has nothing to do with IPS policies but  the entire ‘Intrusion Prevention’ page layout is confusing...

Children
  • The DoS stuff is part of the IPS package.

    Ian

  • rfcat_vk said:
    The DoS stuff is part of the IPS package.

    Ian

    Please read posts more carefully. I understand DoS falls under what Sophos XG classifies as “Intrusion Prevention”. What I said was the DoS Attacks tab has nothing to do with IPS policies, because it doesn’t as far as I can tell. The DoS Attacks tab shows dropped packets specifically pertaining to DoS Attacks (SYN, UDP, TCP, ICMP and IP floods). To view what’s going on with IPS policies, there’s a section in the log viewer.

    I understand you’re trying to help and I appreciate the amount of time and effort you put into replying to nearly every thread on this forum, but I’ve found multiple times it seems like you read posts too quickly before replying. Some day we will figure out how Sophos XG works :) It’s just unfortunate sometimes when it seems like they’ve tried to make things easier, in actual use it makes it more difficult.