Symantec 10521146 Administration Guide - Page 154

Managing flow alert rules

Page 154 highlights

154 Responding Managing flow alert rules ■ Delay between flow export actions (mins): Enter the time in minutes that you want Symantec Network Security to wait between actions per incident. The default delay is 10, the minimum is 1, and the maximum is 256. 5 In Export flows matching which event attribute:, provide the following: ■ Source addresses: Use the IP address from the triggering event. ■ Destination addresses: Use the IP address from the triggering event. ■ Source port: Make port significant when matching related FDS flow entries to the triggering event source IPs. ■ Destination port: Make port significant when matching related FDS flow entries to the triggering event destination IPs. ■ Transport Protocol: Export only matching FDS flow entries of the same protocol as the triggering event (IP, TCP, UDP). 6 In Configure Response Action, click OK to save and exit. 7 In Response Rules, click OK to save and exit. For related information, see the following topics: ■ See "Playing recorded traffic" on page 240. ■ See "Exporting data" on page 254. ■ See "About incident and event data" on page 189. ■ See "Defining new protection policies" on page 120. Managing flow alert rules In addition to response rules, Symantec Network Security can respond to network traffic according to flow alert rules. Flow alert rules respond to traffic flows that violate defined policies on monitored networks. Flow alert rules can be configured to notify you when a sensor or router detects flows that match specific criteria. Symantec Network Security collects data about network flows from various devices. It optimizes the data to enable advanced response actions such as TrackBack, and notifies you about illegal flows. Symantec Network Security uses FlowChaser to store the data, in coordination with TrackBack, which traces a DoS attack or network flow back to its source, or to the edges of the administrative domain. This section describes the following: ■ Viewing flow alert rules

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

154
Responding
Managing flow alert rules
Delay between flow export actions (mins)
: Enter the time in minutes
that you want Symantec Network Security to wait between actions per
incident. The default delay is 10, the minimum is 1, and the maximum
is 256.
5
In Export flows matching which event attribute
:, provide the following:
Source addresses
: Use the IP address from the triggering event.
Destination addresses
: Use the IP address from the triggering event.
Source port
: Make port significant when matching related FDS flow
entries to the triggering event source IPs.
Destination port
: Make port significant when matching related FDS
flow entries to the triggering event destination IPs.
Transport Protocol
: Export only matching FDS flow entries of the same
protocol as the triggering event (IP, TCP, UDP).
6
In
Configure Response Action
, click
OK
to save and exit.
7
In
Response Rules
, click
OK
to save and exit.
For related information, see the following topics:
See
²Playing recorded traffic³
on page 240.
See
²Exporting data³
on page 254.
See
²About incident and event data³
on page 189.
See
²Defining new protection policies³
on page 120.
Managing flow alert rules
In addition to response rules, Symantec Network Security can respond to
network traffic according to flow alert rules. Flow alert rules respond to traffic
flows that violate defined policies on monitored networks. Flow alert rules can
be configured to notify you when a sensor or router detects flows that match
specific criteria.
Symantec Network Security collects data about network flows from various
devices. It optimizes the data to enable advanced response actions such as
TrackBack, and notifies you about illegal flows. Symantec Network Security uses
FlowChaser to store the data, in coordination with TrackBack, which traces a
DoS attack or network flow back to its source, or to the edges of the
administrative domain.
This section describes the following:
Viewing flow alert rules