Use the Block IP active response in SEM
Use the Block IP active response to block an IP address at your firewall using your SEM Manager. This action is useful for blocking port scanners, and can be automated in a SEM rule, or executed manually from the Respond menu in the SEM console.
You can use the Block IP active response with the following firewalls/modules:
- Cisco PIX
- Cisco ASA
- Cisco Firewall Services Module
- FortiGate Firewalls
- Juniper NetScreen
- Check Point OPSEC
- WatchGuard Firebox (including Vclass)
Configure the Active Response connector for one of the firewalls listed above on your SEM manager.
Configure the Active Response connector for your firewall
- In the SEM Events Console, navigate to Nodes > Manager Connectors.
- In the search box, enter active response.
- Select your firewall active response connector, and then click Add Connector.
- Complete the connector configuration form according to your firewall specifications, and then click Add.
- Under Configured connectors, select the connector, and then click Start.
Configure the rule
- In the SEM Events Console, click the Rules tab.
- On the Rules toolbar, click Create new rule.
- Drag one or more values into the rule definition builder. The drag panel on the left contains searchable filter values that you can drag into the rule definition builder. Expand a rule values group to select a value, or locate your value by entering a term in the search field.
When you drag a value into the filter builder, the correct drop location is illuminated with a blue line. Learn more here.
- Click Next.
- Under details and actions, add a descriptive rule name.
- To add the Active Response tag to your rule, click Add tag, and then select it from the Activity Types list.
- Click a toggle button to enable the rule after saving, or to enable in test mode.
- Click Add new action, select Block IP, and then click Next.
- Enter the IP address to be blocked, click Add, and then click Create.
The Block IP active response creates a rule on your firewall to block the IP addresses you specify. To allow an IP address through your firewall, delete or modify the rule on your firewall as appropriate.