fw sam_policy batch

Description

The "fw sam_policy batch" and "fw6 sam_policy batch" commands:

  • Add and delete many Suspicious Activity Monitoring (SAM) rules at a time.

  • Add and delete many Rate Limiting rules at a time.

Notes:

  • These commands are interchangeable:

    • For IPv4: "fw sam_policy" and "fw samp".

    • For IPv6: "fw6 sam_policy" and "fw6 samp".

  • You can run these commands in Gaia Clish, or Expert mode.

  • Security Gateway stores the SAM Policy rules in the $FWDIR/database/sam_policy.db file.

  • Security Gateway stores the SAM Policy management settings in the $FWDIR/database/sam_policy.mng file.

Important:

  • Configuration you make with these commands, survives reboot.

  • You can run this command in the Expert mode or in Gaia Clish (Gaia gClish on Scalable Platforms).

  • In a Cluster, you must configure all the Cluster Members in the same way.

  • On Scalable Platforms (ElasticXL, Maestro, and Chassis), you must connect to the Gaia Portal of the applicable Security Group.

  • VSNext mode and Traditional VSX mode do not support Suspicious Activity Monitoring (SAM) Rules. See sk79700.

Best Practice - The SAM Policy rules consume some CPU resources on Security Gateway. Set an expiration for rules that gives you time to investigate, but does not affect performance. Keep only the required SAM Policy rules. If you confirm that an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.

Procedure

Example of a Rate Limiting rule for IPv4

[Expert@HostName]# fw samp batch <<EOF
 
add -a d -l r -t 3600 -c "Limit\ conn\ rate\ to\ 5\ conn/sec from\ these\ sources" quota service any source range:172.16.7.13-172.16.7.13 new-conn-rate 5
 
del <501f6ef0,00000000,cb38a8c0,0a0afffe>
 
add -a b quota source range:172.16.8.17-172.16.9.121 service 6/80
 
EOF
[Expert@HostName]#