Brocade Network Advisor SAN + IP User Manual v12.1.0 User Manual

Page 1789

Advertising
background image

Brocade Network Advisor SAN + IP User Manual

1747

53-1002949-01

Event action definitions

48

2. Click the Import Snort® Rule button.

The Import Snort® Rule File dialog box displays, shown in

Figure 756

.

FIGURE 756

Import Snort® Rule File dialog box

3. Enter the complete path of the Snort rule file located on the Syslog server.

4. Click OK to import the Snort rules.

5. While still in the Add Event Action dialog box, continue to click Next until you advance to the

Action Group - Actions pane.

6. Select the Deploy CLI Configuration check box and click Configure if you want to deploy a

configuration from CLI Configuration Manager to products if the policy criteria have been met.
You can only deploy a CLI configuration for IP products.

NOTE

If the CLI configuration you chose from CLI Configuration Manager contains a non-Fabric OS,
IronWare OS, or Network OS product as a target, the configuration will not be deployed to the
non-Fabric OS, IronWare OS, or Network OS product.

7. Select one of the following existing CLI configuration parameter sources from the Parameter

list:

-

Source IP — The source IP address of the attack.

-

Source Port — The source port of the attack.

-

Destination IP — The destination IP address of the attack.

-

Destination Port — The destination port of the attack.

8. Continue to advance through the Add Event Action dialog box. The Summary pane of the Edit

Event Action dialog box displays an overview of the e-mail configuration you are creating.

9. Review your entries and take one of the following actions:

-

Click Finish to approve the configuration.

-

Click Previous to return to the Action Group - E-Mail Settings pane of the dialog box.

-

Click Cancel to cancel the operation.

Advertising