An alarm is triggered whenever an event matching a specific criteria is generated. An alarm profile lets you define such specific criteria, and also notify you by email, when the corresponding alarm is triggered.
Click the Add link to create a new alarm profile.
Predefined criteria for which the alarm will be triggered.
You can use the logical and/or of the selected criteria using Match all of the following or Match any of the following selections.
You can choose the following alert category and in turn choose predefined alert criteria:
Alert Category:
Alert Criteria:
The selected Alert Criteria of the selected Alert category will be displayed.
This profile type cNetwork Behavioral Analysis (NBA).
an be selected when you would like to be notified of any abnormal behaviors or traffic anomalies. Anomaly reports can be used forAll Devices Selected
By default all the available devices will be selected and if you want to select devices of your choice, click Modify Selection.
Select the devices, for which you want the alarms to be triggered. All the available devices are listed in the Available Device(s) list. Select the devices and click right arrow. The selected devices are moved to the Selected Device(s) list. If you want to remove any device from the Selected Device(s) list, select the devices and click left arrow. The removed devices will be moved back to the Available Device(s) list.
Define Alert Criteria:
Select the type of anomaly alarm report (Anomaly Report Type) you would like to receive. The report types could be Traffic Report, Attack Report, Virus Report, VPN Report, URL Report, Rule Report, or Event Report. Each of the above report types provide a set of filters which can be configured as per the nature of the alarm you would like to receive.
Threshold details:
Bandwidth Alert Profile
Define Alert Criteria:
Threshold details:
Enable No
tification:Click Save
button to save the alarm profile.Threshold common to all Report types:
Show Trend
Assign Owner - Select the owner for the alarm from the Assign Owner: combo box. The combo box lists all the available users in the Firewall Analyzer.
Check for every 15 Mins, 30 Mins, 1 Hour, 2 Hours, 6 Hours, 12 Hours
Traffic Report:
In a period of 1 Hour, 2 Hours, 6 Hours, 12 Hours, 1 Day, 7 Days, 14 Days, 30 Days, This Week, This Month If Total Traffic, Sent Traffic, Received Traffic, Number of Hits, Duration of All, Any Source, Any Destination, Any Protocol exceeds <amount>_ MB, GB, KB or Times or secs, minutes, hours, days.
create an Alert with Priority as - Priority of the alarm can be High, Medium, or Low based on your requirement for notification. Select the appropriate Priority.
Assign owner
Check for every
Attack Report:
In a period of 1 Hour, 2 Hours, 6 Hours, 12 Hours, 1 Day, 7 Days, 14 Days, 30 Days, This Week, This Month If Number of Hits of All, Any Source, Any Destination, Any Protocol, Transaction (SRC,DST), Transaction (SRC,DST,PRO) exceeds <number>_ times.
create an Alert with Priority as - Priority of the alarm can be High, Medium, or Low based on your requirement for notification. Select the appropriate Priority.
Assign owner
Check for every
Virus Report:
In a period of 1 Hour, 2 Hours, 6 Hours, 12 Hours, 1 Day, 7 Days, 14 Days, 30 Days, This Week, This Month If Number of Hits of All, Any Source, Any Destination, Any Protocol Transaction (SRC,DST), Transaction (SRC,DST,PRO) exceeds <number>_ times.
create an Alert with Priority as - Priority of the alarm can be High, Medium, or Low based on your requirement for notification. Select the appropriate Priority.
Assign owner
Check for every
VPN Report:
In a period of 1 Hour, 2 Hours, 6 Hours, 12 Hours, 1 Day, 7 Days, 14 Days, 30 Days, This Week, This Month If Total Traffic, Sent Traffic, Received Traffic, Number of Hits, Duration of All, Any Source, Any Destination, Any Protocol exceeds <amount>_ MB, GB, KB or Times or secs, minutes, hours, days.
create an Alert with Priority as - Priority of the alarm can be High, Medium, or Low based on your requirement for notification. Select the appropriate Priority.
Assign owner
Check for every
URL Report:
In a period of 1 Hour, 2 Hours, 6 Hours, 12 Hours, 1 Day, 7 Days, 14 Days, 30 Days, This Week, This Month If Total Traffic, Sent Traffic, Received Traffic, Number of Hits, Duration of All, Any Source, Any Destination, Any Protocol exceeds <amount>_ MB, GB, KB or Times or secs, minutes, hours, days.
create an Alert with Priority as - Priority of the alarm can be High, Medium, or Low based on your requirement for notification. Select the appropriate Priority.
Assign owner
Check for every
Rule Report:
In a period of 1 Hour, 2 Hours, 6 Hours, 12 Hours, 1 Day, 7 Days, 14 Days, 30 Days, This Week, This Month If Number of Hits, Denied Requests of All, Any Source, Any Destination, Any Protocol exceeds <number>_ times.
create an Alert with Priority as - Priority of the alarm can be High, Medium, or Low based on your requirement for notification. Select the appropriate Priority.
Assign owner
Check for every
Filters common to all Report types:
Time filter values are Working Hours, Non Working Hours, Week Days, Week Ends and the default value is No Criteria. Select the Time value
Source filter conditions are Is, Is Not, Contains, Starts With and Ends With. Enter source name. If you want to enter multiple values, use CIDR or CSV formats.
Protocol filter conditions are Is, Is Not, Contains, Starts With and Ends With. Enter protocol.
Destination filter conditions are Is, Is Not, Contains, Starts With and Ends With. Enter destination name. If you want to enter multiple values, use CIDR or CSV formats.
User filter conditions are Is, Is Not, Contains, Starts With and Ends With. Enter user name.
Traffic Report:
Time
Source
Protocol
Destination
User filter conditions are Is, Is Not, Contains, Starts With and Ends With. Enter user name for which you want the alarm to be generated.
Source Country
Destination Country
Attack Report:
Time
Source
Protocol
Destination
Attack filter conditions are Is, Is Not, Contains, Starts With and Ends With. Enter the attack name for which you want the alarm to be generated.
Message filter conditions are Is, Is Not, Contains, Starts With and Ends With. Enter the message part or whole for which you want the alarm to be generated.
Severity filter conditions are Is, Is Not, Contains, Starts With and Ends With. Enter the severity of the attack for which you want the alarm to be generated.
Source Country
Destination Country
Virus Report:
Time
Source
Protocol
Destination
Virus filter conditions are Is, Is Not, Contains, Starts With and Ends With. Enter the VIRUS name for which you want the alarm to be generated.
Message filter conditions are Is, Is Not, Contains, Starts With and Ends With. Enter the message part or whole for which you want the alarm to be generated.
Severity filter conditions are Is, Is Not, Contains, Starts With and Ends With. Enter the severity of the Virus for which you want the alarm to be generated.
Source Country
Destination Country
VPN Report:
Time
Source
Protocol
Destination
User filter conditions are Is, Is Not, Contains, Starts With and Ends With. Enter user name for which you want the alarm to be generated.
VPN filter conditions are Is, Is Not, Contains, Starts With and Ends With. Enter the VPN connection for which you want the alarm to be generated.
URL Report:
Time
Source
Protocol
Destination
User filter conditions are Is, Is Not, Contains, Starts With and Ends With. Enter user name for which you want the alarm to be generated.
URL filter conditions are Is, Is Not, Contains, Starts With and Ends With. Enter the URL for which you want the alarm to be generated.
Category filter conditions are Is, Is Not, Contains, Starts With and Ends With. Enter the URL category for which you want the alarm to be generated.
Rule Report:
Time
Source
Protocol
Destination
User filter conditions are Is, Is Not, Contains, Starts With and Ends With. Enter user name for which you want the alarm to be generated.
Rule filter conditions are Is, Is Not, Contains, Starts With and Ends With. Enter rule name for which you want the alarm to be generated.
Message filter conditions are Is, Is Not, Contains, Starts With and Ends With. Enter the message part or whole for which you want the alarm to be generated.
Source Country
Destination Country
With the combinational usage of Alert Profile Type, Filters, and Threshold parameters, you will be able to create Alert Profiles addressing your precise and selective needs. Some of the example profile are discussed below:
Say, you want to get notification of all Critical Events, enter the criteria as Severity is '2". For the severity and severity number mapping refer the table given below.
Same way, if you want to get notification of all attack logs, enter the criteria as RecordType is 'attack'.
If you want to get notification for all virus logs, enter the criteria as RecordType is 'virus'.
The mapping table of severity number and severity
Severity |
Severity Number |
Emergency |
0 |
Alert |
1 |
Critical |
2 |
Error |
3 |
Warning |
4 |
Notification |
5 |
Information |
6 |
The notification template types are:
Email based SMS
SMS
Chat
Run Program
Log a Ticket
Web Alarm
Syslog Profile
Trap Profile