N in, Figure 559 – Brocade Network Advisor SAN User Manual v12.3.0 User Manual

Page 1346

Advertising
background image

1294

Brocade Network Advisor SAN User Manual

53-1003154-01

Event action definitions

32

FIGURE 559

Events pane of the Add Event Action dialog box

2. Click the Import Snort® Rule button.

The Import Snort® Rule File dialog box displays, shown in

Figure 560

.

FIGURE 560

Import Snort® Rule File dialog box

3. Enter the complete path of the Snort rule file located on the Syslog server.

4. Click OK to import the Snort rules.

5. While still in the Add Event Action dialog box, continue to click Next until you advance to the

Action Group - Actions pane.

6. Select the Deploy CLI Configuration check box and click Configure if you want to deploy a

configuration from CLI Configuration Manager to products if the policy criteria have been met.
You can only deploy a CLI configuration for IP products.

NOTE

If the CLI configuration you chose from CLI Configuration Manager contains a non-Fabric OS
product as a target, the configuration will not be deployed to the non-Fabric OS product.

7. Select one of the following existing CLI configuration parameter sources from the Parameter

list:

-

Source IP — The source IP address of the attack.

-

Source Port — The source port of the attack.

-

Destination IP — The destination IP address of the attack.

-

Destination Port — The destination port of the attack.

Advertising