All,

I am updating Event 0x00010017 in the custom area to suppress Authentication 
Failure alarms from known IP addresses (like vulnerability scanners ). Just for 
testing purpose I have just put the IP address of my SS machine itself to 
validate the rule.  However none of the rules seems to be working. As soon as 
Event 0x00010017 is generated, its followed by event which indicates that an 
event occurred for which no event format file exists. I made sure that 
custom/CsEvFormat has files for event 0x4cd91000 and 0x4cd91017. Reloaded Event 
configuration from VNM and Tomcat to read the files, none of the rules have 
errors. Am I missing something someware?

0x00010017 E 50 R CA.EventCondition, "{ v 1 } ==  { O 172.22.236.51 } ", 
"0x4cd91000 -:-"        \
                "default", "0x4cd91017 -:-"

0x00010017 E 50 R CA.EventCondition, "strcmp ( { v 1 }, { O 172.22.236.51 } )", 
"0x4cd91000 -:-"        \
                "default", "0x4cd91017 -:-"

0x00010017 E 50 R CA.EventCondition, "regexp ( { v 1 }, { O 172.22.236.51 } )", 
"0x4cd91000 -:-"        \
                "default", "0x4cd91017 -:-"


0x4cd91000 E 10
0x4cd91017 E 10 A 1,0x01030a




Saurabh Bohra
Sr. Network Mgmt Systems Analyst
ESPN Inc.
O: 860-766-0842  |  M: 860-385-3597  |  e-mail: [email protected]


---
To unsubscribe from spectrum, send email to [email protected] with the body: 
unsubscribe spectrum [email protected]

Reply via email to