Description
Manages the Suspicious Activity Monitoring (SAM) rules. You can use the SAM rules to block connections to and from IP addresses without the need to change or reinstall the Security Policy. For more information, see sk112061.
You can create the Suspicious Activity Rules in two ways:
fw sam
commandNotes:
fw sam_policy
and sam_alert
.fw sam
command) are stored in the $FWDIR/log/sam.dat
file.By design, the file is purged when the number of stored entries reaches 100,000.
This data log file contains the records of one of these formats:
<type>,<actions>,<expire>,<ipaddr>
<type>,<actions>,<expire>,<src>,<dst>,<dport>,<ip_p>
sam_blocked_ips
on the Security Gateway.Syntax
[Expert@HostName:0]# fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>] [-f <Security Gateway>] [-t <Timeout>] [-l <Log Type>] [-C] [-e <key=val>]+ [-r] -{n|i|I|j|J} <Criteria> |
[Expert@HostName:0]# fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>] [-f <Security Gateway>] -D |
[Expert@HostName:0]# fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>] [-f <Security Gateway>] [-r] -M -{i|j|n|b|q} all |
[Expert@HostName:0]# fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>] [-f <Security Gateway>] [-r] -M -{i|j|n|b|q} <Criteria> |
Parameters
Parameter |
Description |
---|---|
|
Runs the command in debug mode. Use only if you troubleshoot the command itself. |
|
Enables verbose mode. In this mode, the command writes one message to stderr for each Security Gateway, on which the command is enforced. These messages show whether the command was successful or not. |
|
Specifies the IP address (in the X.X.X.X format) or resolvable HostName of the Security Gateway that enforces the command. The default is |
|
Specifies the SIC name for the SAM server to be contacted. It is expected that the SAM server has this SIC name, otherwise the connection fails. Notes:
|
|
Specifies the Security Gateway, on which to enforce the action.
Notes:
|
|
Cancels all inhibit ( Notes:
|
|
Cancels the Notes:
|
|
Specifies the time period (in seconds), during which the action is enforced. The default is forever, or until the |
|
Specifies the type of the log for enforced action:
|
|
Specifies rule information based on the keys and the provided values. Multiple keys are separated by the plus sign (+). Available keys are (each is limited to 100 characters):
|
|
Specifies not to resolve IP addresses. |
|
Specifies to generate a "Notify" long-format log entry. Notes:
|
|
Inhibits (drops or rejects) new connections with the specified parameters. Notes:
|
|
Inhibits (drops or rejects) new connections with the specified parameters, and closes all existing connections with the specified parameters. Notes:
|
|
Inhibits (drops or rejects) new connections with the specified parameters. Notes:
|
|
Inhibits new connections with the specified parameters, and closes all existing connections with the specified parameters. Notes:
|
|
Bypasses new connections with the specified parameters. |
|
Quarantines new connections with the specified parameters. |
|
Monitors the active SAM requests with the specified actions and criteria. |
|
Gets all active SAM requests. This is used for monitoring purposes only. |
|
Criteria are used to match connections. The criteria and are composed of various combinations of the following parameters:
Possible combinations are:
|
Explanation for the <
Criteria>
syntax:
Parameter |
Description |
|
Matches the Source IP address of the connection. |
|
Matches the Destination IP address of the connection. |
|
Matches either the Source IP address or the Destination IP address of the connection. |
|
Matches the Source IP address of the connections according to the netmask. |
|
Matches the Destination IP address of the connections according to the netmask. |
|
Matches either the Source IP address or Destination IP address of connections according to the netmask. |
|
Matches the specific Source IP address, Destination IP address, Service (port number) and Protocol. |
|
Matches the specific Source IP address, Destination IP address, Service (port number) and Protocol. Source and Destination IP addresses are assigned according to the netmask. |
|
Matches the specific Source IP address, source netmask, destination netmask, Service (port number) and Protocol. |
|
Matches specific Source IP address, Destination IP, destination netmask, Service (port number) and Protocol. |
|
Matches specific Destination IP address, Service (port number) and Protocol. |
|
Matches specific Destination IP address, Service (port number) and Protocol. Destination IP address is assigned according to the netmask. |
|
Matches the Source IP address and protocol. |
|
Matches the Destination IP address and protocol. |
|
Matches the Source IP address and protocol of connections. Source IP address is assigned according to the netmask. |
|
Matches the Destination IP address and protocol of connections. Destination IP address is assigned according to the netmask. |
|
Matches the GTP connections based on the specified keys and provided values. Multiple keys are separated by the plus sign (+). Available keys are:
|