Intrusion Event Thresholds Configuration
To set a threshold, first specify the thresholding type.
Option |
Description |
---|---|
Limit |
Logs and displays events for the specified number of packets
(specified by the Count argument) that trigger the rule during the specified
time period. For example, if you set the type to
Limit, the
Count to
|
Threshold |
Logs and displays a single event when the specified number of
packets (specified by the Count argument) trigger the rule during the specified
time period. Note that the counter for the time restarts after you hit the
threshold count of events and the system logs that event. For example, you set
the type to
Threshold,
Count to
|
Both |
Logs and displays an event once per specified time period, after
the specified number (count) of packets trigger the rule. For example, if you
set the type to
Both,
Count to two, and
Seconds to
|
Next, specify tracking, which determines whether the event threshold is calculated per source or destination IP address.
Option |
Description |
---|---|
Source |
Calculates event instance count per source IP address. |
Destination |
Calculates event instance count per destination IP address. |
Finally, specify the number of instances and time period that define the threshold.
Option |
Description |
---|---|
Count |
The number of event instances per specified time period per tracking IP address required to meet the threshold. |
Seconds |
The number of seconds that elapse before the count resets. If
you set the threshold type to
limit, the
tracking to
Source IP, the
count to
|
Note that you can use intrusion event thresholding alone or in
any combination with rate-based attack prevention, the
detection_filter
keyword, and intrusion event
suppression.
Tip | You can also add thresholds from within the packet view of an intrusion event. |