Building a customized security policy

After having highlighted the function codes of the industrial protocol circulating on your network, you will now be able to implement an adapted security policy. The various steps that you need to follow are:

  1. Choose a predefined protocol inspection profile or build a customized profile for the industrial protocol being considered.
  2. Associate this protocol profile with an application inspection profile.
  3. Modify the action associated with the "function code denied" alert to make it block such traffic.
  4. Modify the filter rule dedicated to the industrial protocol in order to call up this application inspection profile.