cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
141
Views
1
Helpful
4
Replies

Snort3 rate filter

Jiri Tyl
Level 1
Level 1

Hello,

Im trying to configure rate filter in Firepower Snort3 according to this reference: https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/snort3-inspectors/snort-3-inspector-reference/rate-filter-inspector.html

For single rate filter with single GID:SIG combination it is working as expected. But I would like to configure more rate filters, or at least activate rate-filter for this three intrusion rules 135:1, 135:2, 135:3 for single IP address.

In the reference is written: "You can define multiple rate-based filters on the same rule as well as on different rules." And my question is: Does anybody please know how to do this...?

Thanks 

 

1 Accepted Solution

Accepted Solutions

Jiri Tyl
Level 1
Level 1

I finally found a solution to my problem. Maybe I can save someone some time...

Data is array, there under is correct JSON syntax for multiple filter items. On top of this, you should set the corresponding action in the intrussion rule overrides (if it is not in default) for the used GID:SIG ( for me 135:1, 135:2 and 135:3).

{
"rate_filter": {
"type": "singleton",
"enabled": true,
"data": [
{
"apply_to": "[X.X.X.X]",
"count": 10,
"gid": 135,
"new_action": "block",
"seconds": 1,
"sid": 1,
"timeout": 30,
"track": "by_dst"
},
{
"apply_to": "[X.X.X.X]",
"count": 10,
"gid": 135,
"new_action": "block",
"seconds": 1,
"sid": 2,
"timeout": 30,
"track": "by_dst"
},
{
"apply_to": "[X.X.X.X]",
"count": 10,
"gid": 135,
"new_action": "block",
"seconds": 1,
"sid": 3,
"timeout": 30,
"track": "by_dst"
}
]
}
}

View solution in original post

4 Replies 4

Sorry can you more elaborate 

You need many rate limit for same rule 

Or rate limit for many rule 

Thanks 

MHM

Yes, I can elaborate more. I need many rate limit for same rule.

Thanks Jiri 

Jiri Tyl
Level 1
Level 1

I finally found a solution to my problem. Maybe I can save someone some time...

Data is array, there under is correct JSON syntax for multiple filter items. On top of this, you should set the corresponding action in the intrussion rule overrides (if it is not in default) for the used GID:SIG ( for me 135:1, 135:2 and 135:3).

{
"rate_filter": {
"type": "singleton",
"enabled": true,
"data": [
{
"apply_to": "[X.X.X.X]",
"count": 10,
"gid": 135,
"new_action": "block",
"seconds": 1,
"sid": 1,
"timeout": 30,
"track": "by_dst"
},
{
"apply_to": "[X.X.X.X]",
"count": 10,
"gid": 135,
"new_action": "block",
"seconds": 1,
"sid": 2,
"timeout": 30,
"track": "by_dst"
},
{
"apply_to": "[X.X.X.X]",
"count": 10,
"gid": 135,
"new_action": "block",
"seconds": 1,
"sid": 3,
"timeout": 30,
"track": "by_dst"
}
]
}
}

The code you use is not for same rule 

GID:SIG

I think you use SIG 1'2'3

Anyway I think I found solution but I will more check it before answer you

Thanks 

MHM

Review Cisco Networking for a $25 gift card