Add and Edit Event Action Filter Dialog Boxes Field Definitions
The following fields are found in the Add and Edit Event Action Filter dialog boxes:
-
Name—Lets you name the filter you are adding. You need to name your filters so that you can move them around in the list and move them to the inactive list if needed.
-
Enabled—Lets you enable this filter.
-
Signature ID—Identifies the unique numerical value assigned to this signature. This value lets the sensor identify a particular signature. You can also enter a range of signatures.
-
Subsignature ID—Identifies the unique numerical value assigned to this subsignature. The subsignature ID identifies a more granular version of a broad signature. You can also enter a range of subsignature IDs.
-
Attacker IPv4 Address—Identifies the IP address of the host that sent the offending packet. You can also enter a range of addresses.
• Attacker IPv6 Address—Identifies the range set of attacker IPv6 addresses of the host that sent the offending packet in the following format:
<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>-<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>[,<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>-<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>]
Example—2001:0db8:1234:1234:1234:1234:1234:1234,2001:0db8:1234:1234:1234:1234:1234:8888. The second IPv6 address in the range must be greater than or equal to the first IPv6 address.
Note IPv6 addresses are 128 bits represented in hexadecimal and divided into eight 16-bit groups separated by colons. You can skip the leading zeros and you can represent the zeroed groups in the middle with a double colon (::). You must start the address with the 2001:db8 prefix.
-
Attacker Port—Identifies the port used by the attacker host. This is the port from where the offending packet originated. You can also enter a range of ports.
-
VictimIPv4 Address—Identifies the IP address of the host being attacked (the recipient of the offending packet). You can also enter a range of addresses.
• VictimIPv6 Address—Identifies the range set of victim IPv6 addresses of the host that is the being attacked (the recipient of the offending packet) in the following format:
<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>-<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>[,<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>-<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>]
Example—2001:0db8:1234:1234:1234:1234:1234:1234,2001:0db8:1234:1234:1234:1234:1234:8888. The second IPv6 address in the range must be greater than or equal to the first IPv6 address.
Note IPv6 addresses are 128 bits represented in hexadecimal and divided into eight 16-bit groups separated by colons. You can skip the leading zeros and you can represent the zeroed groups in the middle with a double colon (::). You must start the address with the 2001:db8 prefix.
-
Victim Port—Identifies the port through which the offending packet was received. You can also enter a range of ports.
-
Risk Rating—Indicates the risk rating range between 0 and 100 that should be used to trigger this event action filter. If an event occurs with a risk rating that falls within the minimum-maximum range you configure here, the event is processed against the rules of this event filter.
-
Actions to Subtract—Opens the Edit Actions dialog box and lets you choose the actions that should be removed from the event, should the conditions of the event meet the criteria of the event action filter.
• More Options
–
Active—Lets you add the filter to the filter list so that it takes effect on filtering events.
–
OS Relevance—Lets you filter out events where the attack is not relevant to the victim operating system.
–
Deny Percentage—Determines the percentage of packets to deny for deny attacker features. The valid range is 0 to 100. The default is 100 percent.
–
Stop on Match—Determines whether or not this event will be processed against remaining filters in the event action filters list. If set to No, the remaining filters are processed for a match until a Stop flag is encountered. If set to Yes, no further processing is done. The actions specified by this filter are removed and the remaining actions are performed.
–
Comments—Displays the user comments associated with this filter.
Adding, Editing, Deleting, Enabling, Disabling, and Moving Event Action Filters
To add, edit, delete, enable, disable, and move event action filters, follow these steps:
Step 1
Log in to the IME using an account with administrator or operator privileges.
Step 2
Choose
Configuration >
sensor_name
> Policies > Event Action Rules > rules0 > Event Action Filters
, and then click
Add
.
Step 3
In the Name field, enter a name for the event action filter. A default name is supplied, but you can change it to a more meaningful name.
Step 4
In the Enabled field, click the
Yes
radio button to enable the filter.
Step 5
In the Signature ID field, enter the signature IDs of all signatures to which this filter should be applied. You can use a list (2001, 2004), or a range (2001–2004), or one of the SIG variables you defined on the Event Variables tab. Preface the variable with $.
Step 6
In the SubSignature ID field, enter the subsignature IDs of the subsignatures to which this filter should be applied.
Step 7
In the Attacker IPv4 Address field, enter the IP address of the source host. You can use a variable you defined on the Event Variables tab. Preface the variable with $. You can also enter a range of addresses (for example, 0.0.0.0-255.255.255.255).
Step 8
In the Attacker IPv6 Address field, enter the range set of attacker IPv6 addresses of the source host in the following format:
<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>-<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>[,<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>-<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>].
The second IPv6 address in the range must be greater than or equal to the first IPv6 address. You can also use a variable you defined on the Event Variables tab. Preface the variable with $.
Note IPv6 addresses are 128 bits represented in hexadecimal and divided into eight 16-bit groups separated by colons. You can skip the leading zeros and you can represent the zeroed groups in the middle with a double colon (::). You must start the address with the 2001:db8 prefix.
Step 9
In the Attacker Port field, enter the port number used by the attacker to send the offending packet.
Step 10
In the Victim IPv4 Address field, enter the IP address of the recipient host. You can use one of the variables if you defined them on the Event Variables tab. Preface the variable with $. You can also enter a range of addresses (for example, 0.0.0.0-255.255.255.255).
Step 11
In the Victim IPv6 Address field, enter the range set of IPv6 address of the recipient host in the following format.
<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>-<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>[,<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>-<XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX>].
The second IPv6 address in the range must be greater than or equal to the first IPv6 address. You can use a variable you defined on the Event Variables tab. Preface the variable with $.
Note IPv6 addresses are 128 bits represented in hexadecimal and divided into eight 16-bit groups separated by colons. You can skip the leading zeros and you can represent the zeroed groups in the middle with a double colon (::). You must start the address with the 2001:db8 prefix.
Step 12
In the Victim Port field, enter the port number used by the victim host to receive the offending packet.
Step 13
In the Risk Rating field, enter a risk rating range for this filter. If the risk rating for an event falls within the range you specify, the event is processed against the criteria of this filter.
Step 14
In the Actions to Subtract field, click the note icon to open the Edit Actions dialog box. Check the check boxes of the actions you want this filter to remove from the event.
Tip To choose more than one event action in the list, hold down the Ctrl key.
Step 15
In the Active field, click the
Yes
radio button to add this filter to the list so that it takes effect on filtering events.
Step 16
In the OS Relevance drop-down list, choose whether you want to know if the alert is relevant to the operating system that has been identified for the victim.
Step 17
In the Deny Percentage field, enter the percentage of packets to deny for deny attacker features. The default is 100 percent.
Step 18
In the Stop on Match field, click one of the following radio buttons:
a.
Yes
—If you want the Event Action Filters component to stop processing after the actions of this particular filter have been removed. Any remaining filters will not be processed; therefore, no additional actions can be removed from the event.
b.
No
—If you want to continue processing additional filters.
Step 19
In the Comments field, enter any comments that you want to store with this filter, such as the purpose of this filter or why you have configured this filter in a particular way.
Tip To discard your changes and close the Add Event Action Filter dialog box, click Cancel.
Step 20
Click
OK
. The new event action filter now appears in the list on the Event Action Filters tab.
Step 21
To edit an existing event action filter, select it in the list, and then click
Edit
.
Step 22
Make any changes needed.
Tip To discard your changes and close the Edit Event Action Filter dialog box, click Cancel.
Step 23
Click
OK
. The edited event action filter now appears in the list on the Event Action Filters tab.
Step 24
To delete an event action filter, select it in the list, and then click
Delete
. The event action filter no longer appears in the list on the Event Action Filters tab.
Step 25
To move an event action filter up or down in the list, select it, and then click the
Move Up
or
Move Down
arrow icons.
Tip To discard your changes, click Reset.
Step 26
Click
Apply
to apply your changes and save the revised configuration.