cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

Who rated this post

L2 Linker

When traffic is allowed by a Security Policy and there is a Vulnerability Protection Profile defined to the Security Policy, the firewall checks the traffic for vulnerabilities specified in the Vulnerability Protection Profile.  If the traffic matches a vulnerability signature, an action is taken place.  The more Security Policies you have Vulnerability Protection Profiles defined with, the better you are protected.  However, it may create some false positives.  In that case you may want to adjust the "action" to the "severity" that you are comfortable with in the Vulnerability Protection Profiles.  For us, we "reset-both" action for critical, high, and medium severities, "default" action for low severity, and "allow" action for informational severity.  Finally, there are a few Threat IDs we have made individual "exceptions" to within the Vulnerability Protection Profile.

 

I would say your Security Policies that pass traffic TO/FROM the Untrust zone would likely have the most risk and is where you definitely want to have Vulnerability Protection Profiles enabled.

 

I hope this helps!

View solution in original post

Who rated this post