fw sam_policy

Description

Manages the Suspicious Activity Policy editor that works with these types of rules:

Also, see these commands:

Notes:

Important:

Best Practice - The SAM Policy rules consume some CPU resources on Security Gateway. Set an expiration for rules that gives you time to investigate, but does not affect performance. Keep only the required SAM Policy rules. If you confirm that an activity is risky, edit the Security PolicyClosed Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection., educate users, or otherwise handle the risk.

Syntax for IPv4

fw [-d] sam_policy

      add <options>

      batch

      del <options>

      get <options>

fw [-d] samp

      add <options>

      batch

      del <options>

      get <options>

Syntax for IPv6

fw6 [-d] sam_policy

      add <options>

      batch

      del <options>

      get <options>

fw6 [-d] samp

      add <options>

      batch

      del <options>

      get <options>

Parameters

Parameter

Description

-d

Runs the command in debug mode.

Use only if you troubleshoot the command itself.

Best Practice - If you use this parameter, then redirect the output to a file, or use the script command to save the entire CLI session.

add <options>

Adds one Rate Limiting ruleClosed Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session. one at a time.

See fw sam_policy add.

batch

Adds or deletes many Rate Limiting rules at a time.

See fw sam_policy batch.

del <options>

Deletes one configured Rate Limiting rule one at a time.

See fw sam_policy del.

get <options>

Shows all the configured Rate Limiting rules.

See fw sam_policy get.