18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

C HAPTER 17<br />

Alarm Events and<br />

Responses<br />

About this chapter This chapter explains alarm events and assists you in configuring<br />

alarm events and event responses for your site. This chapter includes<br />

the following topics:<br />

Configuring alarm<br />

events and event<br />

responses<br />

“Configuring alarm events and event responses” on page 17-1<br />

“Example alarm event scenario” on page 17-13<br />

“Sample Strikeback results” on page 17-15<br />

“Ignoring network probe attempts” on page 17-17<br />

“Checking system status” on page 17-19<br />

“Checking network status” on page 17-22<br />

<strong>Sidewinder</strong> <strong>G2</strong> alarm events (also referred to as auditbots) allow you<br />

to monitor your network for potentially threatening activities ranging<br />

from an attempted attack to an audit overflow. Using the Admin<br />

Console, you can configure how many events for a particular alarm<br />

must occur within a particular time frame before an event response is<br />

triggered.<br />

When activity that matches alarm event criteria is encountered, the<br />

event response you configured for that alarm event determines how<br />

the <strong>Sidewinder</strong> <strong>G2</strong> will respond. The <strong>Sidewinder</strong> <strong>G2</strong> can be<br />

configured to respond by notifying an administrator <strong>of</strong> the event via<br />

email or pager, as well as performing a Strikeback. You can configure<br />

Strikebacks to gather information about users who are making<br />

network access violations, and track down additional information<br />

regarding an attempted attack. You can also configure a Strikeback to<br />

ignore packets from a particular host for a specified period <strong>of</strong> time.<br />

The configuration options you select will depend mainly on your<br />

site’s security policy and to some extent on your own experiences<br />

using the features. You may want to start with the default options and<br />

make adjustments as necessary to meet your site’s needs.<br />

17<br />

Alarm Events and Responses 17-1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!