Configuring Traffic Anomalies Rulebase Rules (NSM Procedure)
The traffic anomalies rulebase employs a traffic flow analysis method to detect attacks that occur over multiple connections and sessions (such as scans).
To configure a traffic anomalies rulebase rule:
- In the NSM navigation tree, select Policy Manager > Security Policies.
- Select and double-click the security policy to which you want to add the traffic anomalies rulebase rule.
- Click New in the upper right corner of the policy viewer and select Add Traffic Anomalies Rulebase.
- Click the New button within the rules viewer to add a rule.
- Modify the property of the rule by right-clicking the table cell for the property and making your modifications.
- Configure or modify the rule using the settings described in Table 1.
Table 1: Traffic Anomalies Rulebase Rule Properties
Option | Function | Your Action |
---|---|---|
No | Specifies if you want to add, delete, copy, or reorder rules. | Right-click the table cell for the rule number and make your required modifications. |
Match > Source | Specifies the address object that is the source of the traffic. | Select any to monitor network traffic originating from any IP address. Note: You can also negate one or more address objects to specify all sources except the excluded object. |
Match > Destination | Specifies the address object that is the destination of the traffic, typically a server or other device on your network. | Select the destination object. Note: You can also negate one or more address objects to specify all destinations except the excluded object. |
Match > Service | Specifies service objects in rules to service an attack to access your network. | Set a service by selecting any of the available options. Note: We recommend that you do not change the default value, TCP-ANY. |
Traffic Anomaly | Specifies how IDP is to treat the matching traffic. | Select any of the following options:
|
IP Action | Allows you to log, drop, or close the current connection for each attack that matches a rule. | Select Configure to do any one of the following actions:
|
Notification | Allows you to create log records with attack information that you can view real-time in the Log Viewer. Note: For more critical attacks, you can also set an alert flag to appear in the log record. | Select Configure to create log records. Note: The Configure menu option does not appear if the Mode column is set to None.
|
VLAN Tag | Specifies that you can configure a rule to only apply to messages in certain VLANs. | Set a value by selecting any of the following options:
|
Severity | Specifies if you can override the inherent attack severity on a per-rule basis within the IDP rulebase. | Set the severity to Default, Info, Warning, Minor, or Critical. Note: This column only appears when you view the Security Policy in Expanded Mode. |
Install On | Specifies the security devices or templates that receive and use this rule. | Select the target security device. Note: You can also select multiple security devices on which to install the rule. |
Comments | Specifies any miscellaneous comment about the rule's purpose. | Enter any additional comments about the rule. |
For more information, see the IDP Concepts & Examples guide.