18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 19: Auditing and Reporting<br />

Auditing on the <strong>Sidewinder</strong> <strong>G2</strong><br />

540<br />

2 In the Advanced area, you can further refine the filter(s) you selected by<br />

specifying any <strong>of</strong> the following information:<br />

• Source Burb — Select this option to receive audit events generated by<br />

the source burb.<br />

• Source IP Address — Select this option to receive audit events<br />

generated by the source IP address.<br />

• Number Of Bits — If you selected Source IP, type the number <strong>of</strong> bits for<br />

the source IP address that you want to filter.<br />

• Destination Burb — Select this option to receive audit events generated<br />

by the destination burb.<br />

• Destination IP Address — Select this option to receive audit events<br />

generated by the destination burb.<br />

• Number Of Bits — If you selected Destination IP, type the number <strong>of</strong><br />

bits for the destination IP address that you want to filter.<br />

• Service — Select this option and enter a service name to receive only<br />

audit events generated by that service.<br />

3 To customize the filter expression to view more specialized audit<br />

information, select the Custom check box. For example, if you want to view<br />

HTTP attack audit events for a user named Lloyd, you would type the<br />

following information in this field:<br />

type t_attack and cmd httpp and username Lloyd<br />

You can also use the pre-defined filters as building blocks to create your<br />

own custom filter. To do this, you will need to clear the Custom check box,<br />

select the pre-defined filters that you want to use, and then select the Custom<br />

check box. You can then modify the filter as needed without having to<br />

create it completely from scratch.<br />

You cannot save a customized filter that you create in the Audit Filtering<br />

window. However, you can create and save custom filters using<br />

cf audit. Filters that you create will appear in the filter list when you next<br />

access the Filtering tab.<br />

For detailed instructions on creating custom audit filters, refer to the<br />

sacap_filter man page. See “Creating custom audit filters” on page 544<br />

for more information.<br />

Table 33: Pre-defined audit filters<br />

Attack Description<br />

ACL deny Detects when a connection is denied by a rule in the active<br />

policy.<br />

Access Control List Detects all ACL audit events.<br />

Application<br />

Defense violation<br />

all<br />

Detects attacks <strong>of</strong> all severities that violate active policy<br />

defined by Application Defenses. This attack category<br />

includes spam filter attacks and keyword filter failure<br />

attacks.<br />

More...

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!