• Contact
  • About Me
  • Privacy Policy
  • Disclaimer
DefenceDev
  • Home
  • Blog
  • Linux Tutorials
    • Bash Scripting Lessons
    • Commands
    • Networking
    • Bash Scripts
  • Solutions
    • Docker
  • Network Tutorials
    • FortiGate
    • MikroTik
  • Projects
    • AdGuard
    • Immich
    • Nextcloud
    • WordPress
  • Cloud
  • Video Tutorials
    • YouTube Channel
    • MikroTik Videos
No Result
View All Result
  • Home
  • Blog
  • Linux Tutorials
    • Bash Scripting Lessons
    • Commands
    • Networking
    • Bash Scripts
  • Solutions
    • Docker
  • Network Tutorials
    • FortiGate
    • MikroTik
  • Projects
    • AdGuard
    • Immich
    • Nextcloud
    • WordPress
  • Cloud
  • Video Tutorials
    • YouTube Channel
    • MikroTik Videos
No Result
View All Result
DefenceDev
No Result
View All Result
ADVERTISEMENT
Home Network Tutorials FortiGate

Setting Up IPS (Intrusion Detection System) Profiles on FortiGate to Detect Web Attacks

neo by neo
July 29, 2025
in FortiGate
0
Setting Up IPS (Intrusion Detection System) Profiles on FortiGate to Detect Web Attacks

Setting Up IPS (Intrusion Detection System) Profiles on FortiGate to Detect Web Attacks

0
SHARES
55
VIEWS
Share on FacebookShare on Twitter

IPS (Intrusion Detection System) profiles are applied to firewall policies. If you’re not familiar with creating firewall rules, read this guide first.

Table of Contents
  • IPS (Intrusion Detection System) Profiles on FortiGate
    • Understanding Web-Based Attacks and How IPS Detects Them
    • Example Configuration: Creating and Applying an IPS Profile
    • Conclusion

IPS (Intrusion Detection System) Profiles on FortiGate

Setting up IPS (Intrusion Detection System) profiles on FortiGate to detect web attacks is a crucial step in securing your network infrastructure. As cyber threats targeting web applications continue to evolve, deploying a well-configured Intrusion Prevention System (IPS) ensures that malicious traffic such as SQL injections, cross-site scripting, and other common web-based attacks are detected and blocked effectively. In this article, we will guide you through the process of setting up IPS profiles on your FortiGate device, enabling you to protect your web servers and applications from potential breaches.

Understanding Web-Based Attacks and How IPS Detects Them

Web attacks often target vulnerabilities in web servers, content management systems, and web applications. Some of the most common types include:

  • SQL Injection (SQLi) – Injecting malicious SQL commands through input fields to manipulate backend databases.
  • Cross-Site Scripting (XSS) – Injecting scripts into web pages viewed by other users, often used to steal cookies or session tokens.
  • Remote File Inclusion (RFI) & Local File Inclusion (LFI) – Exploiting input fields to include unauthorized files on the server.
  • Command Injection – Executing system commands via poorly sanitized input fields.
  • Directory Traversal – Gaining access to directories and files outside the web root.

FortiGate’s IPS engine analyzes traffic in real-time, comparing packet data against known attack signatures. When a match is found, the IPS can log, alert, or block the traffic—depending on your configuration.

For deeper analysis of suspicious traffic, you can also perform a packet capture directly on the FortiGate device. Learn how to capture and analyze packets here.

Example Configuration: Creating and Applying an IPS Profile

To detect web attacks on a FortiGate 60D, follow these steps to create an IPS profile and apply it to your firewall policy:

Step 1: Create a New IPS Sensor Profile

  1. Log in to the FortiGate GUI.
  2. Go to Security Profiles > Intrusion Prevention.
  3. Click Create New and name the profile, for example: Web_Attack_Protection.
  4. Under IPS Filters, choose Add Filter.
    • In the filter section, set:
      • Target: Server
      • Severity: Critical, High, and Medium
      • Target: Server
    • If you select IPS Signatures, you can manually select signatures relevant to:
      • SQL Injection
      • XSS
      • Directory Traversal
      • RFI/LFI
      • Web Shells
    • Click Apply to add them to the profile.
  5. Under Action, select Block for severe threats and Monitor or Alert for lower-severity items if you’re unsure.
  6. Save the IPS sensor.
Create IPS Profile
Create IPS Profile
Create IPS Filter
Create IPS Filter
Select Values for IPS Filter
Select Values for IPS Filter

Step 2: Apply IPS Profile to Firewall Policy

  1. Go to Policy & Objects > IPv4 Policy.
  2. Edit the policy that handles incoming HTTP/HTTPS traffic (typically from WAN to LAN/DMZ).
  3. Scroll down to Security Profiles.
  4. Enable IPS and select the Web_Attack_Protection profile.
  5. Click OK to save changes

In this post, you can find how to assign security policy to the firewall policy:

Fortinet FortiGate Policy Implementation

Step 3: Monitor Detected Threats

After configuration:

  • Go to Log & Report > Intrusion Prevention to monitor detected threats.
  • Ensure logging is enabled in the firewall policy to keep visibility.

In this post you can check more information about logging:

ADVERTISEMENT
Fortinet FortiGate Logging: Log Management and Best Practices

Conclusion

Web applications are often exposed to a variety of threats, but FortiGate’s IPS feature provides an effective first line of defense. By setting up an IPS profile specifically tuned to detect common web-based attacks, you can significantly reduce the risk of compromise.

ADVERTISEMENT

Regularly updating the IPS signatures, reviewing logs, and fine-tuning your profiles will help maintain robust protection. Even on older devices like the FortiGate, proactive configuration and monitoring can go a long way in securing your network.

About The Author

neo

See author's posts

Tags: fortigate
ADVERTISEMENT
Previous Post

How to Protect a Self-Hosted Application from Brute Force Attacks with FortiGate

Next Post

Nextcloud: My Top 5 Must-Have Apps

neo

neo

Related Posts

Home Lab with Fortinet FortiGate 60D Firewall
FortiGate

Home Lab with Fortinet FortiGate 60D Firewall

My Ultimate FortiGate Command Cheat Sheet
FortiGate

My Ultimate FortiGate Command Cheat Sheet

Protect a Self-Hosted Application from Brute Force Attacks with FortiGate
FortiGate

How to Protect a Self-Hosted Application from Brute Force Attacks with FortiGate

FortiGate DDoS Protection: Configure DoS Policies to Secure Self-Hosted Applications
FortiGate

FortiGate DDoS Protection: Configure DoS Policies to Secure Self-Hosted Applications

Fortinet FortiGate Site-to-Site IPsec VPN Troubleshooting
FortiGate

Fortinet FortiGate Site-to-Site IPsec VPN Troubleshooting

Why Upgrade to a FortiGate Firewall? Enhanced Security, Visibility & Performance for Businesses
FortiGate

Why Upgrade to a FortiGate Firewall? Enhanced Security, Visibility & Performance for Businesses

Next Post
Self-Hosted Nextcloud Hub 10 on Ubuntu – My Top 5 Apps

Nextcloud: My Top 5 Must-Have Apps

Leave a Reply

Your email address will not be published. Required fields are marked *


Recommended

Automatic Windows Service Monitoring and Restart Script

Automatic Windows Service Monitoring and Restart Script

Fortinet FortiGate Policy Implementation

Fortinet FortiGate Policy Implementation

Automatic Windows Service Monitoring and Restart Script

Automatic Windows Service Monitoring and Restart Script

10+ Useful Linux find Command Examples You Should Know

10+ Useful Linux find Command Examples You Should Know

Host a Website on Raspberry Pi – Real Benchmark Tests

Host a Website on Raspberry Pi – Real Benchmark Tests

Categories

  • Blog
  • Cloud
    • Private
  • Linux Tutorials
    • Bash Scripting Tutorials
    • Commands
    • Networking
  • Network Tutorials
    • FortiGate
    • MikroTik
  • Projects
    • AdGuard
    • Immich
    • Nextcloud
    • WordPress
  • Solutions
    • Docker
  • Video Tutorials
    • MikroTik Videos
ADVERTISEMENT

DefenceDev Tutorials

defencedev Logo

Whether you’re just starting or looking to expand your skills, I hope you find useful information and engaging discussions here. Let me take you through my journey and the goals behind this space!

Follow Us

Recent News

Automatic Windows Service Monitoring and Restart Script

Automatic Windows Service Monitoring and Restart Script

10+ Useful Linux find Command Examples You Should Know

10+ Useful Linux find Command Examples You Should Know

  • Site Map
  • Privacy Policy
  • Facebook Page
  • Disclaimer
  • Contact
  • About Me

© 2025 defencedev.com - All rights reserved.

No Result
View All Result
  • Home
  • Blog
  • Linux Tutorials
    • Bash Scripting Lessons
    • Commands
    • Networking
    • Bash Scripts
  • Solutions
    • Docker
  • Network Tutorials
    • FortiGate
    • MikroTik
  • Projects
    • AdGuard
    • Immich
    • Nextcloud
    • WordPress
  • Cloud
  • Video Tutorials
    • YouTube Channel
    • MikroTik Videos

© 2025 defencedev.com - All rights reserved.