D-Link DFL-260E CLI Guide for DFL-260E - Page 118

Activate BlackList. Default: No

Page 118 highlights

3.24.1. IDPRuleAction Chapter 3. Configuration Reference An IDP Rule Action specifies what signatures to search for in the network traffic, and what action to take if those signatures are found. Properties Action Signatures BlackList BlackListTimeToBlock BlackListBlockOnlyService BlackListIgnoreEstablished PipeLimit PipeNetwork PipeNewConnections PipeTimeWindow LogEnabled LogSeverity Comments Specifies what action to take if the given signature is found. (Default: Audit) Specifies what signature(s) to search for in the network traffic. (Optional) Activate BlackList. (Default: No) The number of seconds that the dynamic black list should remain. (Optional) Only block the service that triggered the blacklisting. (Default: No) Do not drop existing connection. (Default: No) Specifies the bandwidth limit in kbps for hosts triggered by this action. Traffic shaping will only apply to hosts that are within this network. (Default: 0/0) Enable piping of new connections from and to the same host. (Default: No) Throttling of new connections to and from the triggering host will stop after the configured amount of time. (Default: 10) Enable logging. (Default: Yes) Specifies with what severity log events will be sent to the specified log receivers. (Default: Default) Text describing the current object. (Optional) Note If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list. 118

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198

An IDP Rule Action specifies what signatures to search for in the network traffic, and what action to
take if those signatures are found.
Properties
Action
Specifies what action to take if the given signature is
found. (Default: Audit)
Signatures
Specifies what signature(s) to search for in the net-
work traffic. (Optional)
BlackList
Activate BlackList. (Default: No)
BlackListTimeToBlock
The number of seconds that the dynamic black list
should remain. (Optional)
BlackListBlockOnlyService
Only block the service that triggered the blacklisting.
(Default: No)
BlackListIgnoreEstablished
Do not drop existing connection. (Default: No)
PipeLimit
Specifies the bandwidth limit in kbps for hosts
triggered by this action.
PipeNetwork
Traffic shaping will only apply to hosts that are
within this network. (Default: 0/0)
PipeNewConnections
Enable piping of new connections from and to the
same host. (Default: No)
PipeTimeWindow
Throttling of new connections to and from the trig-
gering host will stop after the configured amount of
time. (Default: 10)
LogEnabled
Enable logging. (Default: Yes)
LogSeverity
Specifies with what severity log events will be sent
to the specified log receivers. (Default: Default)
Comments
Text describing the current object. (Optional)
Note
If no
Index
is specified when creating an instance of this type, the object will be
placed last in the list and the
Index
will be equal to the length of the list.
3.24.1. IDPRuleAction
Chapter 3. Configuration Reference
118