Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1 Manual page 207

Configuring dsms
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1:
Table of Contents

Advertisement

- <Field Name="Source Mac Address">
<Patterns />
</Field>
- <Field Name="Destination Mac Address">
<Patterns />
</Field>
- <Field Name="Netbios Name">
<Patterns />
</Field>
- <Field Name="Group Name">
<Patterns />
</Field>
- <Field Name="Severity">
<Patterns />
</Field>
- <Field Name="Device Time">
<Patterns />
</Field>
- <Field Name="Source IP Pre NAT">
<Patterns />
</Field>
- <Field Name="Destination IP Pre NAT">
<Patterns />
</Field>
- <Field Name="Source IP Post NAT">
<Patterns />
</Field>
- <Field Name="Destination IP Post NAT">
<Patterns />
</Field>
- <Field Name="Destination Port Post NAT">
<Patterns />
</Field>
- <Field Name="Destination Port Pre NAT">
<Patterns />
</Field>
- <Field Name="Source Port Pre NAT">
<Patterns />
</Field>
- <Field Name="Source Port Post NAT">
<Patterns />
</Field>
</Fields>
</DSM>
In the above Universal DSM definition, the standard Java regular expression rules
apply. Most critically, the use of the Pattern Group field must agree with the
following Java regular expression definition:
Configuring DSMs Guide
Building the Universal DSM XML Configuration File
201

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents