HomeBlog

March 24, 2025

-

7 Minute Reading

How to Configure IPS (Intrusion Prevention System) on SECUI

Learn how to configure IPS on SECUI with practical steps to protect your network from cyber threats.


An Intrusion Prevention System (IPS) is a network security technology that detects and prevents cyber threats in real-time. IPS analyzes network traffic and compares it with a signature database to identify suspicious patterns, such as malware attacks, system exploits, and network scanning attempts. By implementing a proper IPS, organizations can protect their digital assets from evolving threats.

In this article, we will explain how to configure IPS on SECUI devices, from initial setup to effectiveness testing.

Intrusion Prevention System detects and prevents threats..png Image 0.1 Simple IPS topology using SECUI

1. Login to SECUI

img1.png Image 1.1 SECUI login screen

2. IPS Configuration

Before configuring IPS, make sure the IPS Database is updated to the latest version. This is essential because an updated database contains the latest threat signatures, allowing IPS to recognize and prevent emerging cyber threats. If the database is not updated, IPS may fail to detect new attacks, increasing security risks on your network.

• Navigate to System > IPS Signature DB

img2.png
Image 2.1 IPS Signature DB Menu

• Select Online Update

img3.png Image 2.2 Online Update Option

• Click View Update List and choose the latest patch

img4.png Image 2.3 IPS Update List

• Perform the update

img5.png Image 2.4 IPS Database Update Process

3. Creating an IPS Profile

After updating the IPS database, the next step is to create an IPS profile to determine how the system will handle detected threats, including selecting the protection level and blocking rules.

• Open Object/Security Profile > IPS Profile Settings

img6.png
Image 3.1 IPS Profile Settings Menu

• Click Add and enable Enable IPS

img7.png Image 3.2 Adding an IPS Profile

•Fill in the parameters:

Action: Choose whether to Block or Detect threats
Profile Name: Enter the IPS profile name
Description: Add a description of the profile
Default Signature: Choose a signature template, such as "All Signature," or other options as needed
Protection Request Level:
All Condition: All signatures will be included in the profile
High Accuracy: Blocks all signatures with high severity
High Performance: Blocks signatures with medium severity

img7.png
Image 3.3 IPS Profile Parameter Settings

4. Adjusting Signatures

Once the profile is created, you can customize the enabled signatures based on requirements, such as defining which signatures will be detected or blocked based on SID, message, or specific ports.

• Search by SID, Message, Source Port, Destination Port

img10.png Image 4.1 Searching Signatures by SID

• Enable or disable relevant signatures

img9.png Image 4.2 IPS Signature Management

• Example: Preventing NMAP scanning attacks

img11.png Image 4.3 Preventing NMAP Scanning Attacks

5. Configuring Firewall Policies

To make IPS effective in preventing attacks, you must attach it to a firewall policy that controls network traffic.

• Navigate to Security Policy > Firewall Policy Settings

img12.png
Image 5.1 Firewall Policy Settings Menu

• Add the IPS Profile to the firewall policy

img13.png img14.png Image 5.2 Adding IPS Profile to Firewall Policy

• Click OK and then Apply

img15.png Image 5.3 Firewall Configuration Save Process

6. Enabling SSL Decryption (Optional)

To ensure HTTPS traffic can be inspected and filtered by IPS, enable SSL decryption. This allows the system to detect hidden threats within encrypted connections.

• Open Object/Security Profile > Decryption > Decryption Common Settings

img16.png
Image 6.1 SSL Decryption Menu

• Configure settings as needed

img17.png Image 6.2 SSL Decryption Settings

7. IPS Testing

Conduct testing to ensure IPS functions properly by simulating attacks such as NMAP scanning and verifying that the system successfully detects and logs the threats.

• Run NMAP scanning on the target server

img18.png
Image 7.1 Testing with NMAP Scanning

• If the attack is blocked, check the Threat Log:

Navigate to Log/Report > Log > Traffic Session Log
img19.png
Image 7.2 Checking IPS Activity Log

• Ensure logs indicate IPS is working

img20.png img21.png Image 7.3 Attack Log Analysis

• For further analysis, open Analysis > Security Analysis

img22.png img23.png Image 7.4 Viewing the Security Analysis Diagram

• The diagram shows details of the attacker and the victim

img24.png Image 7.5 Security Attack Diagram

Conclusion

Configuring IPS on SECUI is crucial to maintaining network security against cyber threats. By following the steps above, you can optimize system protection against various attacks. Always keep the IPS database updated and monitor logs regularly to enhance security effectiveness.

We hope this article helps you secure your network using SECUI IPS. Happy configuring!

If you need further information or technical assistance regarding SECUI, feel free to contact us now


Last Updated

March 24, 2025

Category

Network Security

Share This

Share This

On This Page

Back to Top

DOES THIS BLOG RELATE TO YOU?

Fortunately, we have the solution for this problem. You can cosult with us for free! Finding us is as simple as clicking a button.

WhatsappEmail
Look At Google Maps

Contact us for
Free Consultation!

Share your challenges, and we'll provide the best solutions for your business, Connecting with us is as simple as clicking a button, and let us come to you.

malifax indonesia address footermalifax indonesia address footer