Brocade Communications Systems WFT-2D User Manual page 1346

San user manual
Table of Contents

Advertisement

32
Event action definitions
2. Click the Import Snort® Rule button.
3. Enter the complete path of the Snort rule file located on the Syslog server.
4. Click OK to import the Snort rules.
5. While still in the Add Event Action dialog box, continue to click Next until you advance to the
6. Select the Deploy CLI Configuration check box and click Configure if you want to deploy a
7.
1294
FIGURE 559
Events pane of the Add Event Action dialog box
The Import Snort® Rule File dialog box displays, shown in
FIGURE 560
Import Snort® Rule File dialog box
Action Group - Actions pane.
configuration from CLI Configuration Manager to products if the policy criteria have been met.
You can only deploy a CLI configuration for IP products.
NOTE
If the CLI configuration you chose from CLI Configuration Manager contains a non-Fabric OS
product as a target, the configuration will not be deployed to the non-Fabric OS product.
Select one of the following existing CLI configuration parameter sources from the Parameter
list:
-
Source IP — The source IP address of the attack.
-
Source Port — The source port of the attack.
-
Destination IP — The destination IP address of the attack.
-
Destination Port — The destination port of the attack.
Figure
560.
Brocade Network Advisor SAN User Manual
53-1003154-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network advisor 12.3.0

Table of Contents