149
Responding
Setting response actions
The following is an example of a custom response command:
/usr/local/bin/myscript.sh -i %i -t %t -s %s [email protected]
The following table describes the variables that can be used in the command line
of custom response actions, console response actions, and email responses:
Preventing logging of passwords in cleartext
To prevent logging of passwords in cleartext, preface the password with a %*
character sequence. Make sure to put the password directly after the %* with no
spaces in between. For example, for the following password:
&*%arG
prepend the password as follows:
%*&*%arG
Table 6-1
Response Variables
Variable
Value
%c
Indicates the event class, such as Sensor or Notice.
%d
Indicates a comma-delimited list of destination IP addresses and ports in
the following format:
<IP address>:port
. Some attacks, such as syn
floods, may have multiple destinations.
%D
Device name; for example:
hub4
.
%F
Flowcookie; for example:
IP%COUNTER%172.16.32.236:0/192.168.0.162:0#255
%I
The user-assigned name of the interface or interface group where the
attack was detected.
%m
MAC address of the source, if available; otherwise left blank.
%s
Indicates a comma-delimited list of source IP addresses and ports in the
following format:
<IP address>:port
. Some attacks, such as syn floods,
may have multiple sources.
%t
Indicates a specific base event type, displayed in the Network Security
console with a human-readable name; for example,
Fragmentation
Attack
.
%T
Indicates when the first event was detected for the incident. Date and time
appears in human-readable format.
%v
Indicates the VLAN number of the destination, if available; otherwise -1.
Summary of Contents for 10521146 - Network Security 7120
Page 1: ...Symantec Network Security Administration Guide...
Page 12: ...12 Contents Index...
Page 14: ...14...
Page 70: ...70...
Page 110: ...110 Populating the topology database Adding nodes and objects...
Page 158: ...158 Responding Managing flow alert rules...
Page 188: ...188...
Page 242: ...242 Reporting Playing recorded traffic...
Page 268: ...268 Managing log files Exporting data...
Page 316: ...316 Advanced configuration Configuring advanced parameters...
Page 318: ...318...
Page 338: ...338 SQL reference Using MySQL tables...
Page 366: ...366 Glossary...
Page 392: ...392 Index...