This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Please clarify IPS Policies?

I see these 10 IPS Policies available with very minimal description for what they do, what situation they apply to, and their relative “strengths”.  I assume strict is stronger than general.

1. DMZ TO LAN

2. DMZ TO WAN

3. LAN TO DMZ

4. LAN TO WAN

5. WAN TO DMZ

6. WAN TO LAN

7. generalpolicy

8. lantowan strict policy

9. lantowan general policy

10. dmzpolicy

Are the Policies directionally dependent , meaning LAN to WAN differs from WAN to LAN?  How?  I have seen other posts saying the source and destination Zones do not matter as the reverse traffic is also checked according to the policy.  Is this true, which would imply LAN to WAN and WAN to LAN are identical?

Do I need two firewall rules one applying WAN TO LAN and the other LAN TO WAN?

What is the difference between lantowan general policy and LAN to WAN?

What is the security level of generalpolicy relative to the others?

The Wizard created a default firewall rule using generalpolicy.  Does that mean it is “good enough” for general use?

I have one web server in LAN exposed by a DNAT rule and chose to apply WAN TO LAN in that rule; however, I don’t know if that is the best choice.  Is it actually doing anything with generalpolicy in the preceeding firewall rule?

I have seen several posts saying descriptions of these policies would be forthcoming, but I can’t find such a thing.  I hope someone can and will do it in response.



This thread was automatically locked due to age.
Parents
  • I ended up just creating my own policy. The “lantowan_general”, “lantowan_strict”, “general policy” and “dmzpolicy” seem to be identical as far as I can tell. They apply to all categories, all severity, all platforms and all targets (7158 rules). I’m not sure if these are just placeholders and the plan was to update them in the future. Hopefully someone from Sophos can shed some light on this topic.

    The custom policy I created is based on:

    - Protect everything connected to my home network.

    - I don’t have any devices running Windows or Solaris.

    - I am not running any servers, database management systems, industrial control systems or ERP systems.

    This significantly reduced the number of rules to 1520. It doesn’t seem to make any difference with bandwidth though, still seeing about 300Mbps with IPS enabled compared to 900Mbps with IPS off.

    Here’s a screenshot of my custom policy:

  • I've experienced the same behaviour regarding the throughput performance. As soon as the IPS is enabled, the amount of patterns doesn't seem to play any rule...

Reply Children
  • Dom Nik said:
    I've experienced the same behaviour regarding the throughput performance. As soon as the IPS is enabled, the amount of patterns doesn't seem to play any rule...

    I know Sophos XG uses Snort for its IPS engine which is limited to a single CPU core for its packet inspection. But based on doing some research on IPS engines and using pfSense, increasing patterns typically decreases throughput. I’d think going from 7k+ patterns to ~1.5k would had some impact, but I ran a speed test multiple times and it didn’t budge. I wonder if Sophos has looked into using Suricata which supports multi cores.