NETSCOUT Arbor APSConsole 6.3 User Guide PDF
NETSCOUT Arbor APSConsole 6.3 User Guide PDF
NETSCOUT Arbor APSConsole 6.3 User Guide PDF
User Guide
Version 6.3
Legal Notice Default
The information contained within this document is subject to change without notice. Arbor Networks, Inc. makes
no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of
merchantability and fitness for a particular purpose. Arbor Networks, Inc. shall not be liable for errors contained
herein or for any direct or indirect, incidental, special, or consequential damages in connection with the
furnishings, performance, or use of this material.
© 2019 Arbor Networks, Inc. All rights reserved. Proprietary and Confidential Information of Arbor Networks, Inc.
Document Number: APSCON-UG-63-2019/08
19 August, 2019
Contents
Preface
About the APS Console Documentation 8
Command Syntax 9
Contacting the Arbor Technical Assistance Center 10
Configuring Notifications 68
Viewing Notifications 72
Appendixes
Appendix A: Notification Formats 337
Email Notification Examples 338
Syslog Notification Examples 339
Appendix B: Using FCAP Expressions 341
Available FCAP Expressions 342
FCAP Expression Reference 344
Logical Operators for Compound FCAP Expressions 349
FCAP Expressions that Indicate Direction 350
Examples of FCAP Expressions 351
Glossary 353
Index 363
This guide describes how to configure and use the NETSCOUT® Arbor APS Console to
manage Arbor APS, to protect critical service availability.
Audience
This guide is intended for the network security system administrators (or network
operators) who are responsible for configuring and managing APS Console on their
networks. These administrators should have a fundamental knowledge of their network
security policies and network configuration.
In this section
This section contains the following topics:
Related documentation
See the following guides for information about APS Console and its deployment:
Reference documentation
Document Contents
APS Console User Instructions and information for using the features in the APS
Guide Console user interface (UI).
APS Console Quick Instructions and requirements for the installation and initial
Start Card configuration of APS Console.
APS Console Quick Instructions and requirements for the installation and initial
Start Card configuration of the APS Console.
APS Console Online Online help topics from the APS Console User Guide and APS
Help Console Advanced Configuration Guide . The Help is context-
sensitive to the APS Console UI page from which it is accessed.
APS Console Online The APS Console API doc is installed with APS Console. You can
API Documentation access it at the following link:
https://IP_address/api/aps-console/docs/v2/endpoints.html
IP_address = the IP address or hostname for your APS
Console
APS User Guide Instructions and information for using the APS user interface (UI).
It also contains instructions and information for configuring
advanced settings in APS, including those that can only be
configured using the command line interface (CLI).
Command Syntax
This guide uses typographic conventions to make the information in procedures,
commands, and expressions easier to recognize.
The following table shows the syntax of commands and expressions. Do not type the
brackets, braces, or vertical bar in commands or expressions.
[ ] (square brackets) A set of choices for options or variables, any of which is optional.
For example: [variable1 | variable2].
Contact methods
You can contact the Arbor Technical Assistance Center as follows:
n Phone US toll free — +1 877 272 6721
Example
APSCON-UG-63-2019/08
Page 9
This section describes APS Console and how to use it to manage APS devices.
In this section
This section contains the following topics:
Note
APS Console can support multiple versions of APS software simultaneously. For more
information about multi-version support, see the APS and APS Console Compatibility
Guide .
The ability to manage multiple APS devices from a single user interface allows you to more
effectively perform the following network management tasks:
n View the critical alerts and events in your network and outside your network that may
put your business at risk.
n Manage the security policies that protect your network from potential threats and
attacks.
n Centralize the server types, protection groups, outbound threat filter, blacklists, and
whitelists to provide consistent protection across your network and a streamlined
workflow.
n Quickly respond to attacks by adjusting the protections on multiple APS devices or an
individual APS, all from APS Console.
When you first connect APS to APS Console, the applicable configurations on APS Console
are copied to APS. Thereafter, any changes to the configurations on APS Console are
periodically copied to each APS as appropriate.
n APS checks APS Console periodically for configuration changes and obtains the
changes that apply to the APS.
See “1About the APS Console - APS Data Synchronization” on page 78.
In APS Console, you can view the connection and synchronization status for a specific APS
in the System Information section on the Summary page. See “Viewing the APS
synchronization status” on page 78.
Single sign-on
You can navigate to an APS from several areas in the APS Console UI, which allows you to
examine specific data more closely. For example, from the Blocked Hosts Log page in APS
Console, you can navigate to the Blocked Hosts Log page in the APS that blocked a
particular host.
If your APS user account has the same username as your APS Console user account, the
APS opens without prompting you to log in. You can use a different password for each
account.
Important
To use single sign-on with an APS, the APS must have a valid reverse DNS lookup. If the
APS does not have a valid reverse DNS lookup, then APS Console links to the IP address
of the APS instead of its hostname. If this happens, an SSL certificate error will occur.
About the UI
On APS Console, you use the UI to configure system settings and view and analyze
network traffic on managed APS devices.
The APS Console UI uses the HTTPS protocol for secure sessions. The certificate is based
on Arbor’s Certificate Authority (CA); however, you can use your own certificate. See “Using
a Custom SSL Certificate for User Authentication” on page 47.
See “Logging in to and out of the APS Console UI” on page 19 and “Navigating the APS
Console UI” on page 22.
Typically, the CLI is used for installing and upgrading the software and completing the
initial configuration. However, some advanced functions can be configured only by using
the CLI.
See “Using the Command Line Interface (CLI)” in the APS Console User Guide .
This section describes how to log in to and navigate the APS Console user interface (UI).
You use the UI to configure system settings, manage network security rules, and view and
analyze network traffic.
In this section
This section contains the following topics:
Initial requirements
You must complete all of the initial configuration procedures listed in the Quick Start
Cards for your appliances. Verify that you have done the following:
n connected and configured your APS Console
Important
Change this password for security purposes after you log in for the first time.
For information about changing your password, see “Editing Your User Account” on
page 20.
Important
Change this password for security purposes after you log in for the first time.
For information about changing your password, see “Editing Your User Account” on the
next page.
The first time you access APS Console, you must accept the SSL certificate to complete the
secure connection. For more information, see your web browser’s instructions for
accepting certificates.
Troubleshooting
If you cannot access the UI, verify that you are logged in to your computer with a local
administrator account. Then try to log in to APS Console again.
If you are not an administrative user, you can only view and edit your own account. An
administrative user can edit any account.
When you create or edit the accounts of other users, the entry screen is somewhat
different. See “Configuring User Accounts” on page 39.
Passwords must meet certain criteria. See “Criteria for secure and acceptable passwords”
on page 36.
Username box Displays the user name that was originally assigned. You cannot
edit the user name.
Email box Type your email address as a fully qualified domain name. For
example, user@example.com.
If the administrator who created your user account entered your
email address, APS Console created a notification for that email
address. If you change or delete your email address, be sure to
edit or delete any related notifications on the Configure
Notifications page (Administration > Notifications). See
“Configuring Notifications” on page 68.
n Arbor Smart Bar — See “About the Arbor Smart Bar” on page 26.
Navigation menus
Menu Description
Dashboard View an overview of the security status of your network.
Protect Assign APS devices to protection groups and add hosts to the
inbound and outbound blacklists and whitelists.
About submenus
You can hover your mouse pointer over a menu item to view submenus for that item.
Using Help
When you click the Help button on any UI page, a window appears that contains
information about the page that you are viewing.
Paging icons
The system also displays the following paging icons that allow you to move forward and
backward through the pages:
Paging icons
Description Function
> Navigates to the next page.
Refreshing pages
You can click (refresh) on the Arbor Smart Bar to manually update the page with the
most current data.
For more information, see “About the Arbor Smart Bar” on page 26 .
Selecting all
Some tables include check boxes that you can use to select specific rows. These tables also
include a Select All check box next to the column header. When you select this check box
and then click an action button, the system selects all of the rows on the current page of
the table and acts upon them simultaneously.
The columns that contain alphabetical data are initially sorted in alphabetical order. Click
an alphabetical column header to re-sort the table by that column in reverse order (Z-A).
The alphabetical sort is case-sensitive. For example, in an alphabetical sort, Atlas would
appear before arbor.
The columns that contain numerical data are initially sorted in ascending order. Click a
numerical column header to re-sort the table by that column in descending order.
Navigation icons
The following table shows the navigation icons and how you use them:
Navigation icons
Icon Function
Expand table rows or choose reporting components.
Refresh items.
Perform an ascending sort. When this icon appears, the column is sorted in
descending order. Click the icon to sort in ascending order.
Perform a descending sort. When this icon appears, the column is sorted in
ascending order. Click the icon to sort in descending order.
or Display a context menu, which provides options that are relevant to the
context (or page) in which the menu appears. These options link to other
pages in the UI.
If the icons are available when a detail window is open, then their actions apply to the
detail window only. For example, if a detail window is open and you save as a PDF file, the
resulting file contains only the information in the detail window.
Functions
You can perform the following functions on the Arbor Smart Bar:
Print This Page Click to open your browser’s print window and print a
page.
If the icons are available when a detail window is open, then their actions apply to the
contents of the detail window only. For example, if a detail window is open and you save
as a PDF file, only the contents of the detail window are included in the PDF file.
Note
Before you can send email from APS Console, you must configure an SMTP Server and a
Default URL Hostname . See “Configuring General Settings” on page 32.
Setting Description
Email to box Type the recipient’s email address.
By default, the graphs display traffic statistics for each minute of the last hour. This level of
visibility allows you to inspect the traffic on a much deeper scale. On some pages, you can
change the timeframe and unit of measure in which the graphs are displayed.
Examples of the pages that contain stacked graphs are the Dashboard page and the View
Protection Group page.
About minigraphs
Changing the display timeframe
On certain pages in the UI, you can change the timeframe for which the traffic data is
displayed. The timeframe can represent a specific time increment or a time range.
Examples of the pages that contain the timeframe display are the View Protection Group
page and the Dashboard page.
Note
The bits per second (bps) values that APS displays for traffic statistics are based on the
layer 3 packet size.
This section describes how to set up the basic components of APS Console.
In this section
This section contains the following topics:
General Settings
Details about General Settings
Setting Description
DNS box Type the IP addresses of your DNS servers, to map IP addresses
to hostnames in APS Console. Type multiple servers as a
comma-separated list of IP addresses.
APS Console tries to connect to the first IP address in the list as
the primary name server. If that address fails, then APS Console
tries the subsequent addresses in the list as backup name
servers.
SMTP Server box Type the IP address or domain name for the SMTP server that
APS Console uses to send email notifications. You can specify
one SMTP server.
Default URL Type a hostname or a fully qualified domain name that appears
Hostname box as a link in the notification and emails that originate from APS
Console. For example, console.example.com. APS Console also
uses this URL as the “from” address when you send an email
message that contains a PDF of a UI page.
Date Format list Select the format in which to display dates throughout the
system:
n mm/dd/yy (month/day/year)
n dd/mm/yy (day/month/year)
n yy/mm/dd (year/month/day)
The SNMP agent runs only when the APS Console services run. When you stop the
services, SNMP is not available.
1 Set a community string to In the UI, on the Configure General Settings page,
authenticate the external type a string in the SNMP Agent Community box.
sources that poll APS See “About the SNMP Agent Community string” on
Console. the facing page.
If you want to limit the external sources that can use SNMP to poll APS Console. configure
a unique SNMP Agent Community string. This string is used to authenticate external
sources. See “Configuring General Settings” on page 32.
For information about editing your own user account, see “Editing Your User Account” on
page 20.
For information about the different levels of system access, see “Editing Your User
Account” on page 20.
See “Configuring the Password Length Requirements” in the APS Console Advanced
Configuration Guide .
Location Displays the IP address from which the user last connected to APS
Console.
Time Displays the last time the user logged in to APS Console.
Failures Indicates the number of times that the user tried to log in but was
unsuccessful. This number is cleared when the user successfully
logs in to the system.
Selection check Allows you to select the user account for deletion.
box
You can assign users to user groups on the User Accounts page in the user interface (UI),
or in the command line interface (CLI). See “Adding Users to User Groups” in the APS
Console Advanced Configuration Guide .
system_user The users in this group have read-only access to most of the UI
pages and can edit and update their own user account settings.
They can log in to the CLI and run limited CLI commands. For
example, they can view the current system configuration.
You add, edit, and delete the user accounts on the Configure User Accounts
(Administration > User Accounts) page.
You cannot edit the user name after the user account is created.
If you make a mistake in the user name, delete the account and
re-create it.
Group list Select the user group to assign to this user. The user group
determines the user’s level of system access.
This list does not appear for non-administrative users. You
cannot change the group for the default “admin” user.
See “About User Groups” on page 38.
Email box Type the user’s email address as a fully qualified domain name.
For example, user@example.com.
When you enter an email address for a user account, APS
Console creates a notification for that email address. If you
change or delete a user’s email address, be sure to edit or delete
any related notification on the Configure Notifications page
(Administration > Notifications). See “Configuring
Notifications” on page 68.
The Audit Trail page also allows you to view the audit trail log. See “Viewing the Audit Trail
Log” on page 319.
For general information about the audit trail, see “About the Audit Trail” on page 316 .
Option Steps
Enable or disable the For the Globally enable or disable the audit trail
Audit Trail window for dialogs setting, select Enable or Disable.
all changes.
Enable or disable the For each setting, select Show or Don’t Show.
Audit Trail window for
individual changes.
5. Click Save.
6. If the Audit Trail window appears, type a message for the audit trail or accept your
default message, if any.
See “Configuring the Syslog Destination for the Audit Trail” in the APS Console Advanced
Configuration Guide .
Note
The alert settings that you configure apply to future alerts only. They do not apply to
alerts that APS Console has already generated.
For example, if you want to send notifications as syslog messages to an external system,
then configure a syslog notification. When you configure the alert settings, you select the
syslog notification as its destination.
Setting Description
Notification Select Yes to enable notifications for this alert. Select No to
Enabled options disable the notifications.
By default, notifications are disabled for all of the system
alerts.
Note
The notifications for APS Up/Down events may be delayed
by up to five minutes. This delay occurs because APS
Console waits to make sure that an APS device is down and
not experiencing a temporary connection issue.
If you do not enable notifications, you do not have to configure the remaining
settings.
Severity level Select the severity level to assign to this system alert, where 1
is the least severe and 10 is the most severe.
See “About alert severity levels” on page 302.
4. Click Save.
5. If the Audit Trail window appears, type a message for the audit trail or accept your
default message, if any.
Note
You also can run local backups. See “Running a Local Backup Manually” on page 332.
Types of backups
APS Console supports the following types of backups:
n remote backups that you run on a recurring backup schedule or that you run manually
n local backups that run automatically every night at midnight or that you run manually
For more information about these types of backups, see “About APS Console Backups”
on page 330 .
See “Restoring APS Console from a Backup” in the APS Console Advanced Configuration
Guide .
5. If the Audit Trail window appears, type a message for the audit trail or accept your
default message, if any.
Schedule remote Select the backup frequency (Daily or Weekly), and then
backups to occur select the time of day at which the backup should begin.
section
Copy via options Select the way in which the backup is copied: SCP (Secure
Copy Protocol using SSH) or SMB (Server Message Block).
Port box Type the port on the backup server to which APS Console
connects. For SCP backups, the default port is 22. For SMB
backups, the default port is 139.
Share box For an SMB backup, type the file share for the file system
share.
Directory box Type the path to the target directory on the backup server.
The following guidelines apply:
n Use an absolute path for SCP. The path must start with a
forward slash (/) and may contain underscores (_) and
alphabetic and numeric characters.
n Use a relative path for SMB.
n Use a forward slash (/) as a directory separator.
Username box Type the user name with which to authenticate on the
backup server.
Generate Key button If you select DSA Key authentication and a key has not been
Download Public Key generated, click Generate Key to generate a DSA key.
button If a DSA key has been generated, click Download Public
Key to download a copy of the key.
You also can upload the CA certificate that is used to sign the custom SSL certificate.
n The SSL file must contain the certificate and the key that was used to create the
certificate.
n The SSL file and CA file cannot be password protected.
4. If the Audit Trail window appears, type a message for the audit trail or accept your
default message, if any.
5. Log out of APS Console, close your browser, and then restart your browser.
The custom logo image must be a GIF file that is smaller than 500 kB.
Note
For information about the other uses for the Files page, see “About the Files Page” on
page 324 .
This section describes how to use the ATLAS Intelligence Feed (AIF) to detect and stop
emerging botnet and application-layer attacks.
In this section
This section contains the following topics:
The AIF is a global service of the Arbor Security Engineering and Response Team (ASERT).
The ASERT security researchers discover and analyze emerging threats and develop
targeted defenses, based on the data from Arbor’s Active Threat Level Analysis System
(ATLAS). For more information about ASERT and ATLAS, visit
https://www.netscout.com/global-threat-intelligence.
The AIF profiles emerging threats to facilitate the detection and mitigation of DDoS attacks,
malware, and other security hazards to help ensure service availability and data integrity.
When automatic AIF updates are enabled, APS Console uses HTTPS to download the latest
AIF information at regular intervals.
By default, the AIF updates run automatically every 24 hours. You can change the
frequency of the updates and you can force an update at any time.
Important
These components are subject to change as ASERT updates the feed.
You enable the APS threat protection when you configure the server types or the
outbound threat filter (OTF). See “ATLAS Intelligence Feed Settings” on page 120.
For general information about AIF, see “About the ATLAS Intelligence Feed” on page 52 .
ASERT organizes related threat policies into threat categories. Each threat category is
further subdivided into threat subcategories, which are limited collections of related threat
policies. For example, the Malware threat category might contain subcategories such as
RAT (remote access Trojan), Fake Antivirus, and other malware threats. Each of these
subcategories consists of the policies that define the specific threats.
The AIF is updated frequently as the ASERT researchers identify new threats. Although the
threat categories remain relatively static, they are subject to change.
In APS, you can enable threat blocking and view traffic statistics by threat category. When
you do so, you can also configure custom confidence values for specific threat categories.
The confidence value is a relative value on the ATLAS confidence index, which represents
ASERT’s confidence that the rules in a threat policy will identify malicious traffic. APS uses
the confidence value to determine whether to apply the corresponding rule to block
traffic.
For outbound traffic, APS blocks the DNS request for a fully qualified domain name that is
known to be bad. For inbound traffic, APS blocks the response from the DNS server for a
fully qualified domain name that is known to be bad.
For example, an infected internal asset sends a request to a DNS host (192.0.2.1) to resolve
the IP address of a fully qualified domain name that is known to be bad. If the AIF threat
categories are enabled for inbound traffic only and the request matches a domain threat
policy, APS blocks the response from the DNS host.
APS only sees the request to the DNS server, not the resolution of the IP address for the
fully qualified domain name. Consequently, APS reports the DNS server as a blocked host
on the Blocked Hosts Log page. For the example above, 192.0.2.1 appears in the
Destination column on the Blocked Hosts Log page.
If the AIF threat categories are enabled for the outbound threat filter and the DNS request
matches a domain threat policy, APS blocks the request.
Note
For APS to block outbound DNS requests, you must enable the outbound threat filter
and the AIF threat categories for the outbound threat filter. See “Configuring the
Outbound Threat Filter” on page 115.
You can use a packet capture to determine the hostname that is being requested and
blocked. See “Investigate why a DNS server appears to be blocked” on page 263.
A DNS server can be blocked for some other reason, for example, if it is blacklisted or it
matches a DNS regular expression. In such cases, APS blocks all of the traffic to the DNS
server.
APS applies the threat rules based on the ATLAS confidence values, the configured
confidence values for the associated threat categories, and the active protection level, as
follows:
n When the ATLAS confidence value is less than the threat category’s confidence value for
the active protection level, then APS passes the traffic.
n When the ATLAS confidence value is greater than or equal to the threat category’s
confidence value for the active protection level, then APS blocks the traffic.
At the higher protection levels, APS blocks more traffic; however, the lower confidence
values might cause some clean traffic to be blocked.
See “Example: How APS applies the threat rules” on the facing page.
Example
The following figure shows how the ATLAS confidence values for a rule can change over
time, given the following scenario:
n On Day 1, Day 2, and Day 3, ATLAS observes a malware threat from 192.0.2.1. ATLAS
creates a rule under the Malware threat category and assigns a confidence value of 100
to the new rule.
n Because no malware is observed from 192.0.2.1 after Day 3, the confidence value
decreases over time.
n On Day 29 and Day 30, ATLAS again detects a malware threat from 192.0.2.1, and resets
the confidence value to 100.
The confidence value changes do not adhere to a fixed timeframe. The date span in this
simplified example is for illustration purposes and does not necessarily represent an
actual timeframe for confidence value changes.
Example: How the ATLAS confidence values can change over time
Given those conditions, the following table shows how APS would apply the threat rules to
the traffic:
The protection levels determine which search engine traffic is inspected and which
protection categories are used, as follows:
Medium Traffic from a smaller set of enabled search engines is passed with
limited inspection.
For more information about the AIF, see “About the ATLAS Intelligence Feed” on page 52 .
Note
You can also configure the AIF in the command line interface (CLI). See “Configuring the
ATLAS Intelligence Feed (AIF) in the CLI” in the APS Console Advanced Configuration
Guide .
Requirements
On APS Console, you must configure a valid DNS server that can contact the Arbor DNS
server for valid name resolution. You can configure this information on the Configure
General Settings page. See “Configuring General Settings” on page 32.
The AIF server uses your client certificate to authenticate an SSL session to allow you to
download the updated feed.
AIF settings
When you enable the automatic AIF updates, configure the following settings:
Check for AIF Type the interval at which APS Console should check the AIF
updates every box server for updates to the threat feed data. Type any number
of hours from 1 to 168 (7 days); the default interval is one
hour.
Update Now button (Optional) Click this button to force an AIF update at any time.
For example, when you first implement APS Console, you
might want to force an AIF update to test the connection.
If you made any configuration changes, they do not take
effect until you click Save.
Use proxy to connect (Optional) Select this check box to allow APS Console to
to AIF server check connect to the AIF server through a proxy server.
box If you do not select this check box, you can skip the
remaining settings in the AIF Proxy Configuration section.
Host box Type the IP address or the hostname for the proxy server.
Port box Type the port number for the proxy server.
Username box If necessary, type the user name that is required to access
the proxy server.
Password box If necessary, type the password that is required to access the
proxy server.
You can search for “ATLAS” to filter the display for AIF entries. See “Viewing the Audit Trail
Log” on page 319.
For general information about ATLAS Intelligence Feed, see “About the ATLAS Intelligence
Feed” on page 52.
This information reflects the global protection level or the protection group’s protection
level, for those groups that have their own protection level configured.
For the active protection level and for any lower protection levels, the traffic statistics
represent the attacks that were blocked. For any protection level that is higher than the
active level, the traffic statistics represent the attacks that would be blocked if that level
were active.
A large graph represents the traffic that was detected and blocked at all of the levels.
This section describes how to define destinations for sending alert notifications. You can
create notifications for any combination of email addresses, SNMP traps, and syslog
messages.
You can group similar recipients so that they all receive the same types of event
notifications. For example, you can create a notification that includes all of your network
security engineers.
User access
Users at all authorization levels can view the notification configurations. Only
administrators and can perform the configuration tasks that are described in this section.
In this section
This section contains the following topics:
About Notifications 66
Configuring Notifications 68
Viewing Notifications 72
About Notifications
When APS Console detects events, conditions, or errors in the system, it creates alerts to
inform users. You can configure APS Console to send notification messages to specified
destinations to communicate certain alerts. You do so by associating the alert with one or
more notifications.
A notification defines its destination and the means by which the notification is sent. You
can create notifications for different groups of users, mailing lists, and remote systems.
You also can create notifications when you add user accounts. When you enter an email
address for a user account, APS Console creates a notification for that email address. If
necessary, you can edit or delete these user-specific notifications on the Configure
Notifications page.
Viewing notifications
The Configure Notification page displays all of the notifications that are configured for APS
Console, and allows you to add, edit, and delete notifications. See “Viewing Notifications”
on page 72 and “Configuring Notifications” on page 68.
Note
The notifications for APS Up/Down events may be delayed by up to five minutes. This
delay occurs because APS Console waits to make sure that an APS device is down and
not experiencing a temporary connection issue.
Notification contents
A typical notification contains the alert type and a description. It also includes the default
URL hostname, if one is configured on the Configure General Settings page
(Administration > General). The recipient can copy and paste the URL into a browser to
navigate directly to the event.
Depending on the alert type, the notification can contain additional information, such as
the associated rule, severity, client, server, service, and other messages.
Notification types
The notification type defines how APS Console sends notifications. You can create
notifications for any combination of email addresses, SNMP traps, and syslog messages.
Types of notifications
Configuring Notifications
The Configure Notifications page allows you to configure notifications that APS Console
sends to specified destinations when certain system alerts and events occur.
Configuring notifications
To add or edit a notification:
1. Select Administration > Notifications.
2. On the Configure Notifications page, complete one of the following steps:
l To add a new notification, click Add Notification .
l To edit an existing notification, click the notification name.
3. Configure the following settings:
Setting Description
Name box Type a unique name to identify the notification throughout
the UI. Use a name that helps users recognize the
destinations that it represents. You can use any combination
of letters and numbers.
4. Configure the settings for one of the following destination types, and then click Save.
l Email — See “Email notification settings” on the facing page.
l SNMP — See “SNMP notification settings” on the facing page.
Tip
After you add an SNMP notification, you can click Test to send test SNMP
notification messages. This test allows you to verify that the system is working
properly before it generates an actual alert.
l Syslog — See “Syslog notification settings” on page 70.
5. If the Audit Trail window appears, type a message for the audit trail or accept your
default message, if any.
From box Type the email address that should appear as the sender. You
can use the APS Console name as the sender to easily identify
any APS Console notifications.
If you specified a default From address, it appears here. See
“Setting a default From address” on the previous page.
To box Type the recipient’s valid email address. Enter multiple email
addresses as a comma-separated list.
Destination IP box Type the IP address for each SNMP trap receiver. You can add
up to four IP addresses.
Use commas to separate multiple IP addresses.
Community box (Versions 1 and 2 only) Type the community string (password)
to use for authenticating the SNMP trap. Otherwise, the system
defaults to the standard public setting.
Agent IP box (Version 1 only) Type the IP address for the SNMP agent.
Passphrase box (Version 3 only) Type the passphrase for the SNMP user name
that you specified above if the Security Level setting is set to
something other than No Authentication.
Security Level list (Version 3 only) Select one of the following security levels:
n No Authentication — No passphrase authentication is
performed.
n Authentication/No Privacy — Passphrase authentication
is performed, but there is no encryption of the data in the
trap messages.
n Authentication w/ Privacy — Passphrase authentication
is performed and the data in the trap messages is
encrypted.
Context Name box (Version 3 only, optional) Type the SNMP application context.
Because there is only one SNMP context on APS Console , this
setting typically is not required. However, if your trap receiver
expects a specific context name, then provide it.
Privacy Protocol list (Version 3 only) Verify that this value matches the value that is
expected by your trap receiver.
If you selected Authentication w/ Privacy from the
Security Level list, then select the appropriate privacy
protocol (DES or AES).
Verify that this value matches the value that is expected by your
trap receiver.
Port box (Optional) The default setting is port 514. if you do not want to
use the default port, then type a new port number
For more information about setting the default syslog port, see
“Commands and Subcommands in the /services Menu” in the
APS Console Advanced Configuration Guide .
Facility list Select a syslog facility value to indicate the source of the
message as defined in the syslog protocol RFC 3164.
The default facility is Daemon .
Deleting notifications
You cannot delete a notification that is referenced by a system alert.
To delete a notification:
1. Select Administration > Notifications.
2. On the Configure Notifications page, complete one of the following steps:
l To delete individual notifications, select the check boxes to the right of the
notifications.
l To delete all of the notifications on the current page, select the Select All check
box in the table heading row.
3. Click Delete.
4. In the confirmation message that appears, click OK .
5. If the Audit Trail window appears, type a message for the audit trail or accept your
default message, if any.
Viewing Notifications
The Configure Notifications page displays all of the notifications in the system and allows
you to add, edit, and delete the notifications. See “Configuring Notifications” on page 68.
Notification details
Information Description
Name Displays the name of the notification as a link that opens the Edit
Notification Settings page for that notification.
Log Message Displays the most recent message that was logged for the
notification.
Creator Displays the name of the user who configured the notification.
Last Modified Indicates the last time that the notification was changed by a user
or by the system.
Used By Alert Displays the system alerts that reference the notification as links
Configurations to the corresponding alert Configuration window.
Selection check box Allows you to select the notification for deletion.
This section describes how to use APS Console as a system to manage multiple APS
devices.
User access
Users at all authorization levels can view the APS information. Only administrators and
analysts can perform the configuration tasks that are described in this section.
In this section
This section contains the following topics:
Setting Description
APS Console box Type the IP address or hostname for APS Console.
4. Click Save.
Also, certain backup and restore procedures require that you disconnect APS.
3. On the Configure General Settings page, delete the text in the APS Console box and
the Shared Secret box.
4. Click Save.
For information about connecting APS to APS Console, see “Configuring APS for APS
Console Management” on page 76.
Initial synchronization
When you first connect APS to APS Console, the following items are copied from APS
Console to the APS:
n all of the standard server types
For example, if an APS contains a protection group that is assigned to that APS only,
determine whether an existing protection group on APS Console would serve the same
purpose. If so, then in APS Console, unassign the APS from the local protection group and
assign it to the protection group on APS Console. Then delete the APS-specific protection
group.
These server types include any duplicate server types that APS might have created to
resolve conflicts with the server types that it received from APS Console. See “Initial
synchronization of duplicate configurations” above.
Subsequent synchronizations
Periodically, any configuration changes (additions, modifications, and deletions) on APS
Console are propagated to each APS as applicable. As in the initial synchronization, each
APS obtains only the standard items, the global items, and the items that are specific to the
APS. No items are copied from APS to APS Console.
Caution
After the initial synchronization, the additions and changes to the configurations on APS
Console might overwrite the local configurations on APS. Generally, you should not make
local changes on a managed APS, although you might occasionally need to do so. For
example, you might lose the connection between APS Console and an APS during a high-
volume DDoS attack. In that case, you can make local changes on the APS to mitigate the
attack.
When you back up and restore APS Console and APS, you must follow certain guidelines
to maintain the synchronization. See “How Restoring Backups Affects the APS Console -
APS Synchronization” on page 82.
An APS that contains no configuration The synchronization is the same as when you
data is reconnected to the same APS connect a new APS. See “Initial
Console. synchronization” on page 78.
This situation might occur when you
return the APS for a repair, during
which the configuration data is erased.
An APS with or without configuration The synchronization is the same as when you
data is reconnected to a different APS connect a new APS. Any configurations that
Console. APS obtained from the original APS Console
This situation might occur when you are merged with the data from the new APS
move the APS to a different location in Console. See “Initial synchronization” on
your network or replace the original page 78.
APS Console.
n inactive — APS analyzes traffic and detects attacks without performing mitigations. You
can use the resulting information to set your policies for attack detection and
mitigation.
The inactive mode is most commonly used in trial implementations. See “Implementing
APS for Trial or Monitoring Only” in the APS User Guide .
You can set the protection mode for an individual protection group or the outbound
threat filter without affecting any other traffic. For example, you can set a new protection
group to inactive mode for testing while keeping the APS in active mode. See “Adding,
Editing, and Deleting Protection Groups” on page 231 and “Configuring the Outbound
Threat Filter” on page 115 .
Caution
If you make local changes on an APS device that is managed by APS Console, those
changes are not copied to APS Console. As a result, any changes that you make on an
APS are lost because the configurations from APS Console overwrite the configurations
on APS. Generally, you should not edit the configurations locally on a managed APS.
Outbound threat You can view the protection mode for the outbound threat filter
filter on the Outbound Threat Filter page (Protect > Outbound
Protection > Outbound Threat Filter).
The protection levels are associated with different protection settings. These settings
include those that are not user-defined, such as the invalid packets protection category.
When the protection level is set, the protection settings that are associated with that level
are enabled.
User access
Only administrators can change the protection level. Non-administrative users can view
the current protection level but cannot make changes.
About the protection levels for protection groups and the outbound threat
filter
The protection level determines which protection settings are in use for a specific
protection group or the outbound threat filter. You might change the protection level for a
protection group or the outbound threat filter in the following situations:
n To respond to attacks and traffic spikes against one protection group without affecting
the traffic to the other protection groups.
n To respond to outbound threats without affecting the inbound traffic.
n To determine how different protection levels affect the traffic when you create a new
protection group or change the settings for an existing protection group.
You also can automate the protection level for a protection group. See “About protection
level automation” on page 235.
You also can leave the protection settings empty or disable one or more of the protection
levels. For example, you might disable a setting for the low protection level and then
enable it for the medium and high protection levels.
You configure the protection settings for multiple APS devices on the following pages:
n Configure Server Type page (Protect > Inbound Protection > Server Type
Configuration , click a server type name), for inbound traffic
n Outbound Threat Filter page (Protect > Outbound Protection > Outbound Threat
Filter), for outbound traffic. See “Configuring the Outbound Threat Filter” on
page 115.
You also can automate a protection group’s protection level. The following icons represent
the low automated protection level and the high automated protection level (there is no
medium automated protection level):
You can view the current protection level on the following pages:
View Protection The header area contains text that indicates the
Group page protection group’s protection level.
When you edit a protection group, all of the
protection level icons appear. The protection
group’s current protection level is checked, and
you can click an icon to change the protection
level.
Outbound threat Outbound The header area contains text that indicates the
filter Threat Filter outbound threat filter’s protection level.
page When you edit the outbound threat filter, all the
protection level icons appear. The outbound
threat filter’s current protection level is checked,
and you can click an icon to change the
protection level.
The following table describes when to use the different protection levels and the levels of
protection and risk that are associated with each one:
Medium During a significant The protection settings are stricter. Clean traffic that
attack is unusual might be blocked.
High During a heavy This level provides the most aggressive protection
attack but it carries risks.
Blocking some clean traffic is acceptable as long as
most of the hosts are protected.
For protection groups, you can automate the protection level. When you automate the
protection level, APS uses a total traffic threshold to determine when to change the
protection level from low to high. See “About protection level automation” on page 235.
When you delete a device, it is removed from APS Console and all of its alerts and
protection groups are deleted from APS Console. The deletion does not affect the device
itself or any of the alerts or protection groups on that device.
If you delete a device prematurely and it comes back online, it re-appears in APS Console
and in the System Information section on the Summary page.
For general information about the Summary page, see “Viewing a Summary of System
Activity” on page 310 .
This section describes how to configure and manage the server types that determine
which protection settings are available for each protection group. On APS Console, you
can manage the server types for all of the APS devices that APS Console manages. You also
can add and delete server types on APS Console.
In this section
This section contains the following topics:
APS contains predefined, standard server types for IPv4 hosts and one standard server
type for IPv6 hosts. These standard server types offer protection settings that cover most
situations. To meet your organization’s more specific protection requirements, you can
create custom server types that are based on the standard server types.
When you first connect APS to APS Console, the server types on APS Console are merged
with any existing server types on APS. Thereafter, any changes to the server types on APS
Console are periodically copied to each APS as appropriate. See “1About the APS Console
- APS Data Synchronization” on page 78.
Caution
If you make local changes on an APS device that is managed by APS Console, those
changes are not copied to APS Console. As a result, any changes that you make on an
APS are lost because the configurations from APS Console overwrite the configurations
on APS. Generally, you should not edit the configurations locally on a managed APS.
The generic server type contains all of the protection settings and is associated with the
default protection group.
n Web Server
n DNS Server
n Mail Server
n VoIP Server
n VPN Server
n RLogin Server (remote login)
n File Server
n Generic IPv6 Server
You can associate a custom server type with any custom protection group. See “Adding,
Editing, and Deleting Protection Groups” on page 231.
Your organization might have one HTTP server that serves standard web pages,
another that serves video, and another with a heavy AJAX interaction. Some of the HTTP-
related protection categories, such as HTTP Rate Limiting, might not apply to all of those
servers. You can create a custom server type with the appropriate protection settings
for each of these HTTP servers.
n Different traffic rates
An excessive amount of inbound traffic and connections for one server might be
normal for another server. In such cases, setting appropriate thresholds for the rate-
based protection categories can be difficult. You can create custom server types that are
configured for different traffic rates.
n Separate server ownership
In some organizations, different web servers can fall under completely separate
ownership structures, in which different people are responsible for the availability of
the web service. You can create custom server types with separate protection settings
for separately owned servers.
The categories of protection settings that are available for the IPv4 standard server types
are as follows:
ATLAS Intelligence x x x x x x x x
Feed
Application x x x x x x
Misbehavior
Available protection settings for the IPv4 standard server types (continued)
Generic DNS File Mail RLogin VoIP VPN Web
Settings category Server Server Server Server Server Server Server Server
Block Malformed x x
DNS Traffic
Block Malformed x x
SIP Traffic
Botnet Prevention x x x
DNS Authentication x x
DNS NXDomain x x
Rate Limiting
DNS Regular x x
Expression
Filter List x x x x x x x x
Fragment x x x x x x x x
Detection
HTTP Header x x x x
Regular
Expressions
HTTP Reporting x x x
ICMP Flood x x x x x x x x
Detection
Malformed HTTP x x x
Filtering
Multicast Blocking x x x x x x x x
Payload Regular x x x x x x x x
Expression
Private Address x x x x x x x x
Blocking
Rate-based x x x x x x x x
Blocking
SIP Request x x
Limiting
Available protection settings for the IPv4 standard server types (continued)
Generic DNS File Mail RLogin VoIP VPN Web
Settings category Server Server Server Server Server Server Server Server
TCP Connection x x x x
Limiting
TCP Connection x x x x x x x x
Reset
TLS Attack x x x x x
Prevention
Traffic Shaping x x x x x x x x
UDP Flood x x x x x x x x
Detection
For general information about the server types, see “About the Server Types” on page 92 .
For information about editing the server types, see “edAdding and Deleting Custom
Server Types” on page 98 and “Changing the Protection Settings for Server Types” on
page 100 .
Appears when you hover your mouse pointer over a source IP address. Click
(context to display the following options:
menu) n Restore Defaults — Restores the selected server type’s protection
settings to their default values.
When you restore the protection settings for a server type, it affects all of
the protection groups that are associated with that server type. See
“Restoring the Default Protection Settings” on page 108.
n Duplicate — Creates a custom server type that inherits the protection
settings from the selected server type. See “Duplicating an existing server
type” on page 99.
n Delete — (Custom server types only) Deletes the selected server type for
all of the APS devices with which it is associated.
Caution
When you delete a server type, all of the protection groups that are
associated with that server type are deleted. See “Deleting a custom
server type” on page 99.
Profile Capture — Allows you to perform a traffic profile on any of the
APS devices that are associated with the server type.
Base Indicates the standard server type on which a custom server type is based.
Type The base server type name appears as a link to the Configure Server Type
page, where you can view and edit the base server type.
Last Indicates the last time the server type was edited, which allows you to identify
Modified recent configuration changes.
In Use Displays the protection groups that use this server type.
By If multiple protection groups are associated with the server type, this column
displays the number of groups. You can display a list of those protection
groups by hovering your mouse pointer over the displayed number.
You can click a protection group’s name link to display the View Protection
Group page for that protection group.
For general information about the server types, see “About the Server Types” on page 92 .
APS adds this server type to the list of Custom Server Types on the Configure Server Type
page.
Setting Description
Server Type Name Type a name to identify the server type throughout the UI.
box
Base Server Type list Select the server type on which to base the new server
type.
Caution
When you delete a server type, APS deletes all of the protection groups that are
associated with that server type. Any IPv4 prefixes that the deleted protection group
protected are assigned to the default protection group unless they are included in
another custom protection group.
You can customize these settings to provide more directed protection for specific server
types, both standard and custom. If necessary, you can restore a particular server type’s
protection settings to their default values. See “Restoring the Default Protection Settings”
on page 108.
For information about the protection categories and suggestions for when to change the
protection settings, see “About the Protection Settings Configuration” on page 111 . For
general information about the server types, see “About the Server Types” on page 92 .
Caution
If you make local changes on an APS device that is managed by APS Console, those
changes are not copied to APS Console. As a result, any changes that you make on an
APS are lost because the configurations from APS Console overwrite the configurations
on APS. Generally, you should not edit the configurations locally on a managed APS.
To access the Server Types page, select Protect > Inbound Protection > Server Type
Configuration .
The profile data includes passed traffic and might include blocked traffic, depending on
why it was blocked. The data represents all of the protection groups that are associated
with the selected server type. Within each server type, the data applies to certain protection
settings only.
See “About Traffic Profiling for Protection Configuration” on the next page.
If you use APS Console to manage APS, you can manage the profile captures for multiple
APS devices from APS Console.
The profile data includes passed traffic and might include blocked traffic, depending on
why it was blocked. The data represents all of the protection groups that are associated
with the selected server type. Within each server type, the data applies to certain protection
settings only.
However, the values that APS applies do not appear in the fields on the Configure Server
Type page. Any values that were set previously still appear in these fields.
Important
While the profiling is active, do not make any changes to these protection settings
because changes may cause inaccurate profile capture results.
If you use APS Console to manage APS devices, you can select the APS devices on which to
start, stop, and check the status of a profile capture. The capture runs and the results
appear on each selected APS. You can use the profile data as a guide to configuring the
protection settings in APS Console.
APS captures data by server type for the traffic that applies to certain protection settings
only. See “Rate-based protection settings that APS uses for profiling” on page 102.
Caution
If you make local changes on an APS device that is managed by APS Console, those
changes are not copied to APS Console. As a result, any changes that you make on an
APS are lost because the configurations from APS Console overwrite the configurations
on APS. Generally, you should not edit the configurations locally on a managed APS.
Before you can view or use the profile data, you must run a profile data capture to collect
the data. See “Capturing Traffic Profiles from APS Console” on the previous page.
To view the traffic profile data and use it to configure protection settings:
1. On APS Console, select Protect > Inbound Protection > Protection Groups.
2. To view the APS devices that are assigned to a protection group, click (expand) to
the left of a protection group name.
3. Click the name of an APS device.
4. Log into the APS.
5. Select Protect > Inbound Protection > Server Type Configuration .
6. On the Configure Server Type page, select Standard Server Types or Custom
Server Types, and then select a specific server type.
7. Click the (View profile ) icon that appears next to the settings that you want to
configure.
Note
If a capture was not run, or if the most recent capture did not observe any traffic that
applied to this setting, then the icon does not appear.
8. Review the suggested protection settings that appear in the profile window so that
you can configure the corresponding settings in APS Console.
Do not change any settings in APS.
9. Go to APS Console and select Protect > Inbound Protection > Server Type
Configuration .
10. On the Server Types page, click the name link for the server type that you want to
configure.
11. On the Server Types page, edit the protection settings.
histogram Displays the observed traffic volumes that apply to the current
protection setting.
For example, the histogram for the Bits per Second
Threshold setting displays the number of hosts that sent
certain volumes of traffic, measured in bits per second.
The gray area at the far right of the histogram represents
values that are out of the histogram’s displayed range.
Linear and Log Change the scale of the y axis in the histogram graph as
buttons follows:
n Linear presents the number of hosts on a linear scale, in
which the lines in the graph are proportional to the number
of hosts.
n Log presents the number of hosts on a logarithmic scale, in
which each unit increase represents an exponential increase
in the number of hosts.
Maximum x (where x Displays the highest value of the item that is measured.
varies depending on For example, if you view the values for the Bits per Second
the protection setting) Threshold setting, then this value represents the Maximum
bits per second.
Auto button Changes the threshold values in the profile window and the
protection setting fields to the recommended values.
Caution
If you manage the server types in APS Console, do not edit
them in APS.
When you restore the protection settings for a server type, it affects each protection group
that is associated with that server type. If a protection group in APS Console is assigned to
one or more managed APS devices, the server type changes affect each assigned APS.
Restoring the protection settings affects the standard server types and custom server types
as follows:
n When you restore the protection settings for a standard server type, the settings of any
related custom server types are not affected.
n When you restore the protection settings for a custom server type, the settings are
returned to the default settings of the base server type. Any changes that might have
been made to the base server type’s settings are not applied to the custom server type.
For general information about the server types, see “About the Server Types” on page 92
and “edAdding and Deleting Custom Server Types” on page 98 .
The protection settings are the criteria by which APS defines clean traffic and attack traffic.
You configure the protection settings to define how APS identifies and blocks malicious
traffic at each protection level.
In APS Console, you can configure the protection settings for multiple APS devices.
In this section
This section contains the following topics:
The default protection settings in APS provide protection from the most common types of
DDoS attacks. You can customize these settings to provide more directed protection for
specific types of servers and for your outbound traffic. In APS Console, you can customize
the protection settings for multiple APS devices.
For information about types of DDoS attacks, see “DDoS Attacks and APS Protections” in
the APS User Guide .
Allows you to change the protection settings for each of the protected server types. See
“Changing the Protection Settings for Server Types” on page 100.
n Outbound Threat Filter page, for outbound traffic
Allows you to configure the protection settings for the outbound threat filter. See
“Configuring the Outbound Threat Filter” on page 115.
For inbound traffic, each server type contains the categories of protection settings that are
most appropriate for that server type. Each protection group is associated with a server
type and one or more host servers of that type. For example, a Web Server protection
group contains the HTTP categories of settings, which detect HTTP-based attacks.
The outbound threat filter contains the categories of protection settings that are most
appropriate for outbound traffic.
Some of the protection categories temporarily block a host, which effectively blocks all of
the traffic from that host, including its clean traffic. The top 10 hosts that are blocked in this
way appear in the Temporarily Blocked Sources section on the View Protection Group
page. APS does not temporarily block the hosts for outbound traffic.
Other protection categories temporarily block a host’s offending traffic but not its clean
traffic or the host itself. Such hosts do not appear in the Temporarily Blocked Sources
section on the View Protection Group page, but they do appear in the blocked hosts log.
This blockout period typically lasts for several minutes. The protection category that
detects the malicious traffic determines the length of the blockout period, and this time
period cannot be changed.
You also can leave the protection settings empty or disable one or more of the protection
levels. For example, you might disable a setting for the low protection level and then
enable it for the medium and high protection levels.
Typically, you use the default settings when you first install APS. As you use APS and
analyze its actions, you can customize as many settings as needed to secure your data
center from threats against availability. If you have historical traffic information and
statistics from an APS trial or monitor-only implementation, use that information as a
guide for refining the protection settings.
APS can simplify the configuration of certain rate-based protection settings by learning
typical network behaviors and suggesting protection settings that are appropriate for your
network. See “About Traffic Profiling for Protection Configuration” on page 102.
When you install or upgrade APS Console, the outbound threat filter and all of its ATLAS
Intelligence Feed (AIF) threat categories are enabled by default on APS Console. You can
disable the outbound threat filter and the AIF threat categories on the Outbound Threat
Filter page (Protect > Outbound Protection > Outbound Threat Filter). See
“Configuring the Outbound Threat Filter” on page 115.
Important
For the outbound blacklist and outbound whitelist to work, you must leave the
outbound threat filter enabled. See "Blacklisting Outbound Traffic" on page 180 and
"Whitelisting Outbound Traffic" on page 188 .
You configure these protection settings on the Outbound Threat Filter page. You also can
configure the protection mode (active or inactive) and protection level (global, low,
medium, or high) for the outbound threat filter. See “Configuring the Outbound Threat
Filter” on page 115.
For information about the protection categories and suggestions for when to change the
protection settings, see “About the Protection Settings Configuration” on page 111 .
Note
If you turn on DNS Rate Limiting for a protection group, the outbound traffic may match
the protection group instead of the outbound threat filter. By default, DNS Rate Limiting is
turned on for the default IPv4 protection group and any protection groups that use a
DNS server. Custom protection groups also might have this protection turned on. See
“DNS Rate Limiting Settings” on page 131.
About the outbound threat filter’s protection mode and protection level
The outbound threat filter’s protection mode determines whether APS blocks malicious
outbound traffic. In the active mode, APS monitors traffic and mitigates attacks. In the
inactive mode, APS detects attacks but does not mitigate them. To test the outbound
threat filter, set the protection mode for the outbound threat filter to inactive.
The outbound threat filter’s protection level determines which protection settings are in
use for the outbound traffic. The outbound threat filter can use the global protection level
or a protection level that you configure for the outbound threat filter. The outbound threat
filter’s protection level takes precedence over the global protection level.
In APS Console, you can change the outbound threat filter’s protection mode or
protection level for all of the managed APS devices.
When you first connect APS to APS Console, the outbound threat filter on the APS is
replaced with the one from APS Console. Thereafter, any changes to the outbound threat
filter on APS Console are periodically copied to each APS. See “1About the APS Console -
APS Data Synchronization” on page 78.
Caution
If you make local changes on an APS device that is managed by APS Console, those
changes are not copied to APS Console. As a result, any changes that you make on an
APS are lost because the configurations from APS Console overwrite the configurations
on APS. Generally, you should not edit the configurations locally on a managed APS.
You can enable and disable the outbound threat filter, but you cannot delete it.
For more details about the outbound threat filter, see “About the Outbound Threat Filter”
on page 113 .
Important
If you deploy APS in the monitor mode, the outbound traffic does not go through APS.
Therefore, the traffic is not analyzed.
Setting Description
Protection Mode Select Active or Inactive to configure the protection mode.
options For more information about the protection mode, see
“Setting the Protection Mode (Active or Inactive)” on
page 84.
There are several issues that may prevent the outbound threat filter from functioning as
expected, such as:
n misconfiguration of the APS
n an APS deployment that prevents traffic mitigation (for example, you deploy the APS in
an out-of-band mode or inactive mode)
n routing configurations that do not allow APS to see the relevant traffic
For more information, see “About the Outbound Threat Filter” on page 113 .
Testing guidelines
Required configuration settings
You must configure the following settings before testing the outbound threat filter:
n Enable the outbound threat filter.
n Set the protection mode to Active.
n Enable all of the AIF threat categories.
n arbor-aif-test.com
IP address testing
You can use the ping command on the operating system command line to test the
outbound threat filter configuration. This command is available for all of the standard
operating systems.
On the APS Summary Page , you should see a spike in the blocked traffic, as shown in the
following image:
On the Outbound Blocked Threats graph, you should see an increase in the number of
source hosts that APS blocked , as shown in the following image:
The nslookup command is available for all of the standard operating systems.
On the APS Summary Page , you should see a spike in the blocked traffic, as shown in the
following image:
On the Outbound Blocked Threats graph, you should see an increase in the number of
source hosts that APS blocked, as shown in the following image:
You configure these settings on the Configure Server Type page (Protect > Inbound
Protection > Server Type Configuration , and then click on a server type name). See
“Changing the Protection Settings for Server Types” on page 100.
For example, some botnet attacks send multiple, small HTTP requests that cause a series
of bad request errors and overwhelm the victim server. The bot terminates each
connection before the request is complete.
Interrupt Count Type the number of TCP FIN interruptions that are allowed
box from a single client before that client is temporarily blocked.
To disable this setting, leave this box empty.
For a description of the protection levels, see “About the Protection Levels” on page 86 .
When APS detects traffic that matches any of the HTTP header signatures or enabled
threat policies, it blocks the traffic. If the traffic is inbound, APS temporarily blocks the
source host.
For general information about ATLAS Intelligence Feed, see “About the ATLAS Intelligence
Feed” on page 52.
Block botnet (Inbound traffic only) Many botnets are known by their traffic
traffic patterns or profiles that suggest an attack. The AIF updates include
the policies (signatures) that identify known botnets. When you
enable the AIF Botnet Signatures settings, APS compares each
policy to the HTTP headers and HTTP requests. APS blocks any
traffic that matches any of the policies and temporarily blocks the
source host.
Pass web crawler (Inbound traffic only) In the process of protecting your servers from
traffic DDoS attacks, APS might prevent search engine web crawlers from
accessing your site. The AIF updates include a list of the IP address
ranges that Arbor considers to be legitimate search engine web
crawlers. When you enable the Web Crawler Support settings,
APS passes the traffic from the search engine IP addresses.
For more information, see “About Web Crawler Support” on
page 59.
Web Crawler Support (Inbound traffic only) Click one of these buttons to enable
buttons or disable the inspection of traffic for legitimate web crawler
search engines.
For APS to pass the traffic from specific web crawlers, those
web crawlers must be enabled on the Configure AIF Settings
page (Administration > ATLAS Intelligence Feed).
Initially, all of the web crawlers are enabled by default, but
you can choose which web crawlers to enable or disable.
This option is available for the following server types only:
Generic, DNS, and web.
AIF Botnet Signatures (Inbound traffic only) Click one of these buttons to enable
buttons or disable the inspection of traffic based on the traffic
patterns or profiles by which Arbor identifies known
botnets.
This option is available for the following server types only:
Generic, VOIP, and Web.
When you select the Threat Categories check box, the following ATLAS confidence
index settings become available. For more information about the ATLAS confidence
index and the confidence values, see “About the ATLAS Confidence Index” on page 56 .
ATLAS Confidence The default confidence value is applied to all of the rules in
Index options all of the enabled threat categories, except those for which
you define a category-specific confidence value. To specify
the default confidence value, select one of the following
options:
n Use Default — Use the confidence value that the Arbor
Security Engineering and Response Team (ASERT)
recommends, which appears in parentheses after this
option. This option is selected by default.
n Custom — Configure a custom confidence value to use
as the default. When you select this option, type a number
from 1 to 100 in the box to represent the confidence
value.
Threat category check For each of the threat categories, you can configure the
boxes and confidence following settings:
value boxes n To enable or disable a threat category, select its check
box. By default, all of the threat categories are enabled.
n To configure a confidence value for an enabled threat
category, click to the right of the category’s check box to
display the confidence value box. Type a number from 1
to 100 to represent the confidence value.
The threat category confidence value overrides the
default confidence value for the specific category.
These settings are available for the Generic IPv6 Server type and some of the IPv4 server
types. See “About the Server Types” on page 92.
Enabled and Disabled Click one of these buttons to enable or disable this
buttons category.
For a description of the protection levels, see “About the Protection Levels” on page 86 .
You configure these settings on the Configure Server Type page (Protect > Inbound
Protection > Server Type Configuration , and then click on a server type name). See
“Changing the Protection Settings for Server Types” on page 100.
Enabled and Disabled Click one of these buttons to enable or disable this
buttons category.
For a description of the protection levels, see “About the Protection Levels” on page 86 .
You also can prevent botnet attacks based on the traffic patterns or profiles by which
Arbor identifies known botnets. See “ATLAS Intelligence Feed Settings” on page 120.
About botnets
The following patterns of behavior are common to many botnets:
n Sending requests with incomplete header fields
n Sending slow request attacks, which usually contain artificially truncated request
segments
For example, some botnets send multiple, small HTTP requests, and then terminate
each connection before the request is complete. This attack causes a series of bad
request errors and overwhelms the victim server.
Checks the packet headers for incomplete fields. APS blocks any packets whose
headers are incomplete and temporarily blocks the source host.
The fields that are checked vary by protection level, as follows:
Enable Basic Botnet Click one of these buttons to enable or disable the inspection
Prevention buttons of traffic for missing HTTP header fields, which are a common
indicator of botnet attacks.
Prevent Slow Click one of these buttons to enable or disable the inspection
Request Attacks of traffic for requests that are characteristic of slow HTTP
buttons attacks.
The protection categories in APS block malicious traffic, temporarily block malicious hosts,
or both. When traffic is routed through a CDN or proxy, the source IP address is that of the
last CDN or proxy device. That source IP address is shared by all of the users whose traffic
passes that device. Therefore, the protection settings that block an attacker’s IP address
might block all traffic from the CDN or proxy. To prevent the blocking of all traffic from a
CDN or proxy, enable CDN and Proxy Support.
When CDN and Proxy Support is enabled, APS relies on the protection categories that
block malicious traffic but do not block the attacker’s IP address. The clean traffic from the
CDN or proxy is passed.
You configure these settings on the Configure Server Type page (Protect > Inbound
Protection > Server Type Configuration , and then click on a server type name). See
“Changing the Protection Settings for Server Types” on page 100.
Enabled and Disabled Click one of these buttons to enable or disable this
buttons category.
By default, this category is disabled.
For a description of the protection levels, see “About the Protection Levels” on page 86 .
APS forces any clients that send DNS requests to change to TCP before the queries reach
the DNS server. This change validates that the original request came from a legitimate
client. APS blocks any requests that are not verified, but does not block the source hosts.
Important
If a cloud service provider forwards cleaned traffic through a GRE tunnel, then APS does
not inspect that traffic for Spoofed Syn Flood Prevention or DNS Authentication. In this
case, APS ignores these protection settings because it would have to send packets back
through the GRE tunnel.
These settings are available for the Generic IPv6 Server type and some of the IPv4 server
types. See “About the Server Types” on page 92.
Enabled and Disabled Click one of these buttons to enable or disable this
buttons category.
APS temporarily blocks any host that generates more consecutive failed DNS requests
than the configured limit.
These settings are available for the Generic IPv6 Server type and some of the IPv4 server
types. See “About the Server Types” on page 92.
Requirement
If you plan to use these settings, your network must be configured so that APS can see the
DNS response traffic from the DNS server.
DNS NXDomain Rate Type the number of failed queries to allow per second.
Limit box To disable this setting, leave this box empty.
If you do not configure the DNS NXDomain Rate Limiting settings, the processing of
outbound traffic is affected as follows:
n The following response-based protection categories do not block outbound traffic
(these protection categories are configured in the server types):
l Filter List. See “Configuring Filter Lists for Specific Server Types or the Outbound
Threat Filter” on page 164.
l Multicast Blocking. See “Multicast Blocking Settings” on page 139.
l Private Address Blocking. See “Private Address Blocking Settings” on page 143.
n The blacklist does not block outbound traffic.
n You cannot perform a packet capture on “int” interfaces.
To address these issues, you must enable the Outbound Threat Filter and add FCAP
expressions to the filter list to block outbound traffic. See “Configuring the Outbound
Threat Filter” on page 115.
APS inspects all of the DNS traffic that originates from a single source and records the
number of queries per second. It blocks any traffic that exceeds the configured rate limit. If
the traffic is inbound, APS temporarily blocks the source host.
These settings are available for the Generic IPv6 Server type and some of the IPv4 server
types. See “About the Server Types” on page 92.
DNS Query Rate Type the maximum number of DNS queries per second that a
Limit box source can send before it is blocked.
This rate limit represents what you consider to be a reasonable
maximum amount of DNS traffic.
To disable this setting, leave this box empty.
These settings are available for the Generic IPv6 Server type and some of the IPv4 server
types. See “About the Server Types” on page 92.
DNS Regular Type a regular expression to filter out DNS traffic with
Expressions lines matching requests or headers. Use PCRE format.
You can type multiple regular expressions. APS uses the OR
operator for multiple regular expressions.
APS inspects the packet fragments that originate from a single source and records the bits
per second and packets per second. It blocks any traffic that exceeds the configured rate
limits. If the protection level is medium or high, it temporarily blocks the source host.
Maximum bps box Type the maximum amount of traffic (in bps) to allow
from a single source.
Maximum pps box Type the maximum amount of traffic (in pps) to allow
from a single source.
APS inspects HTTP traffic and applies each regular expression to each line of the HTTP
headers and HTTP requests. If any regular expression matches the first HTTP request or
HTTP header in a connection, then APS blocks that request and temporarily blocks the
source host. If any regular expression does not match the first HTTP request or HTTP
header in a connection, then APS whitelists all the HTTP requests for that connection.
For a description of the protection levels, see “About the Protection Levels” on page 86 .
The default limits are usually acceptable for typical users. Because a web server can be
heavily loaded by a small number of HTTP requests, do not raise the limits by large
amounts without careful consideration. If you need to make an exception for a content
mirror server, you can add it to a pass rule in the Filter List settings. See “Configuring Filter
Lists for Specific Server Types or the Outbound Threat Filter” on page 164.
HTTP Request Type the number of HTTP requests to allow per second. An HTTP
Limit box request is any type of request such as GET, POST, HEAD, or
OPTIONS. To disable this setting, leave this box empty.
HTTP URL Limit Type the number of requests for a unique HTTP object (specific
box URL) to allow per second.
For example, the medium level defaults are 500 for the HTTP
Request Limit and 15 for the HTTP URL Limit . If 100 requests
for the same URL are received in one second, they are blocked
because they exceed the URL limit. To disable this setting, leave
this box empty.
For a description of the protection levels, see “About the Protection Levels” on page 86 .
See the following topics for more information about these displays:
n “Viewing the Top URLs for a Protection Group” on page 206
n “Viewing the Top Domains for a Protection Group” on page 208
Enabled and Disabled Click one of these buttons to enable or disable this
buttons category.
For a description of the protection levels, see “About the Protection Levels” on page 86 .
An ICMP flood exploits the ping utility, which allows a user to verify that a particular IP
address exists and can accept requests. The attacker sends a large number of ICMP echo
requests to the victim web server. The server tries to respond to all of the requests until it
exhausts its resources and cannot respond to clean traffic.
Enable ICMP Flood Click one of these buttons to enable or disable this category.
Detection buttons
Maximum Request Type the maximum number of ICMP echo requests per
Rate box second that a source can send before it is blocked.
This rate limit represents what you consider to be a
reasonable amount of ICMP traffic.
Maximum bps box Type the maximum amount of traffic (in bps) to allow from a
single source.
For a description of the protection levels, see “About the Protection Levels” on page 86 .
The bots in a botnet sometimes manufacture the HTTP requests that they use to flood
victim servers, and these requests can be malformed. For example, the request header
might not conform to RFC 2616.
If any of these evaluations fails, APS blocks the request. If the traffic is inbound, APS
temporarily blocks the source host or destination host.
Enabled and Click one of these buttons to enable or disable this category.
Disabled buttons Important
The Botnet Prevention settings work only if Malformed HTTP
Filtering is enabled. If you disable Malformed HTTP Filtering, the
Botnet Prevention settings for the corresponding protection
levels are disabled also. If you enable one of the Botnet
Prevention settings, the Malformed HTTP Filtering is enabled for
the corresponding protection levels. See “Botnet Prevention
Settings” on page 126.
About multicasting
Many attackers use multicasting to reflect and amplify attack traffic. For example, one type
of attack sends echo requests to a multicast address, spoofing the request source with the
victim’s IP address. The amplified request can result in an excessive number of responses
that overwhelm the victim server and prevent it from accepting clean traffic.
To protect against this kind of attack, APS blocks any inbound traffic whose source or
destination is a designated multicast address. APS also blocks any outbound traffic whose
source or destination is a designated multicast address.
Important
If you do not enable the DNS NXDomain Rate Limiting protection settings, the Multicast
Blocking settings do not block outbound traffic. In this situation, you must enable the
Outbound Threat Filter and add FCAP expressions to the filter list to block outbound
traffic. See “Configuring the Outbound Threat Filter” on page 115.
Enabled and Disabled Click one of these buttons to enable or disable this
buttons category.
Many application layer DDoS attacks and packet repetition attacks can be identified by
their payloads. The payload of a TCP packet or UDP packet consists of the data that
appears after the header.
The Payload Regular Expression protection settings are available for all of the IPv4 server
types and for the Generic IPv6 Server type. See “About the Server Types” on page 92.
You can configure the settings for each protection level. See “About the Protection Levels”
on page 86.
You can select source or destination as the direction of the specified ports.
For inbound traffic, if the payload or header matches a regular expression, then APS
drops the packet or temporarily blocks all traffic from the host. For outbound traffic, if the
payload or header matches a regular expression, then APS drops the packet.
APS matches the regular expression against individual packets only. It does not detect
matching content that spans multiple packets.
Note
If you enter a regular expression, but you do not specify any ports or port ranges, APS
passes all TCP and UDP traffic.
Enable Payload Click one of these buttons to enable or disable this category for
Regular Expression each protection level.
buttons
Port Direction To inspect traffic that is sent from TCP ports and UDP ports on
buttons source hosts, click Source . To inspect traffic that is sent to TCP
ports and UDP ports on destination hosts, click Destination .
Payload Regular Type the port numbers to define the TCP traffic to inspect. You
Expression TCP can enter port numbers and port ranges (for example, 10-22).
Ports box To inspect all TCP traffic, enter all.
Use spaces or commas to separate multiple port numbers.
If you set Port Direction to Source , APS matches the regular
expressions against TCP packets that are sent from the
specified ports. If you set Port Direction to Destination , APS
matches the regular expressions against TCP packets that are
sent to the specified ports.
Note
If you specify a regular expression, but you do not specify any
ports or port ranges, APS passes all TCP traffic.
Payload Regular Type the port numbers to define the UDP traffic to inspect. You
Expression UDP can enter single port numbers and port ranges (for example,
Ports box 10-22). To inspect all UDP traffic, enter all.
Use spaces or commas to separate multiple port numbers and
port ranges.
If you set Port Direction to Source , APS matches the regular
expressions against UDP packets that are sent from the
specified ports. If you set Port Direction to Destination , APS
matches the regular expressions against UDP packets that are
sent to the specified ports.
Note
If you specify a regular expression, but you do not specify any
ports or port ranges, APS passes all UDP traffic.
Payload Regular Type the regular expressions to match against packets sent
Expression box from or sent to the specified ports. Use PCRE format. If you add
multiple regular expressions, then press ENTER after each one.
APS uses the OR operator for multiple regular expressions.
Note
If you enter a regular expression, but you do not specify any
ports or port ranges, APS passes all TCP and UDP traffic.
If you enable the Apply Regular Expression to Packet
Headers option, then APS also matches these expressions
against the packet headers.
Apply Regular Click Enabled to match the regular expressions against packet
Expression to headers in addition to packet payloads. If you enable this
Packet Headers option, then APS blocks attacks based on specific patterns in
buttons packet headers.
To match the regular expressions against packet payloads only,
click Disabled.
Action to Apply Click Drop Packets to drop the packets that match regular
buttons expressions. Click Block Hosts to temporarily block all traffic
from the hosts of the packets that match the regular
expressions.
Note
This option only applies to inbound traffic. For outbound
traffic, APS always drops the packets that match the regular
expressions.
You can configure the settings for each protection level. See “About the Protection Levels”
on page 86.
Specific blocks of IP addresses are reserved for use on private networks and their traffic is
not intended to be routed to the internet. Typically, traffic from outside your network
should not originate from a private address. Such traffic is likely to be an attack in which
the private address is spoofed.
To protect against this kind of attack, APS inspects the inbound traffic and blocks any
traffic whose source or destination is a designated private address. APS also blocks any
outbound traffic whose source or destination is a designated private address.
Important
If you do not enable the DNS NXDomain Rate Limiting protection settings, the Private
Address Blocking settings do not block outbound traffic. In this situation, you must
enable the Outbound Threat Filter and add FCAP expressions to the filter list to block
outbound traffic. See “Configuring the Outbound Threat Filter” on page 115.
Enabled and Disabled Click one of these buttons to enable or disable this
buttons category.
These protection settings are available for all of the IPv4 server types and for the Generic
IPv6 Server type. See “About the Server Types” on page 92.
APS uses these settings to limit the rate at which any source host can send traffic. APS
constantly examines the bit rate and packet rate of traffic from each source host. If the
traffic exceeds either of the configured thresholds, APS temporarily blocks the source
host.
Typically, you should set the thresholds to rates that are higher than any legitimate host
would be expected to send on a sustained basis. These rates can vary depending on the
services that the hosts offer. For example, if the protected hosts are content servers and
the source hosts are clients that send only requests and acknowledgments, low traffic
rates are expected.
Note
APS uses a speed measurement algorithm that applies a smoothing function to reduce
the possibility that short-term, high-traffic spikes are treated as attacks.
Bits per Second Type the maximum rate of traffic in bits that a source can
Threshold box send before it is blocked.
Packets per Second Type the maximum rate of traffic in packets that a source
Threshold box can send before it is blocked.
Because SIP servers can send a large amount of data in a single request, communications
between SIP servers may greatly exceed the rate limit. You can protect those servers by
adding them to a pass rule in the Filter List settings or adding them to the whitelist.
See “Configuring Filter Lists for Specific Server Types or the Outbound Threat Filter” on
page 164 or “Whitelisting Inbound Traffic” on page 184 .
SIP Source Limit box Type the maximum number of SIP requests to allow per
second.
To disable this setting, leave this box empty.
Important
If a cloud service provider forwards cleaned traffic through a GRE tunnel, then APS does
not inspect that traffic for Spoofed Syn Flood Prevention or DNS Authentication. In this
case, APS ignores these protection settings because it would have to send packets back
through the GRE tunnel.
The Spoofed SYN Flood Prevention protection settings are available for all of the IPv4 server
types and for the Generic IPv6 Server type. See “About the Server Types” on page 92.
Both Spoofed SYN Flood Prevention and TCP SYN Flood Detection protect against SYN
flood attacks. By forcing all TCP clients to authenticate that they are valid, Spoofed SYN
Flood Prevention can protect against highly distributed attacks.
If APS cannot authenticate a TCP connection, then it drops the traffic on that connection
but does not block the host.
The option that you select determines which protection settings are
available for this protection category.
Except on ports For applications that have difficulty with spoofed SYN flood
box authentication, type the affected application ports. If the traffic’s
destination ports match any of these ports, then APS skips the TCP
authentication.
TCP Out of Click one of these buttons to enable or disable this authentication
Sequence method. If you enable this setting, then APS uses this method to
Authentication authenticate a TCP connection instead of attempting to complete
buttons the TCP 3-way-handshake. See “About TCP authentication” on
page 146.
Spoofed SYN Click one of these buttons to enable or disable automating this
Flood protection category. If you automate this protection category, then
Prevention you must specify an automation threshold.
Automation
buttons
HTTP Click one of the following buttons to select the method that APS
Authentication uses to authenticate HTTP traffic on ports 80 and 8080:
Method buttons
n Redirect — Sends a 302 redirect to the client.
n Soft Reset — Asks the client to resend its request.
n JavaScript — Sends a JavaScript response to the client.
Note
If you select the JavaScript option, then legitimate clients that
do not have JavaScript enabled cannot connect to protected
hosts.
For example, some botnets open hundreds of active or inactive TCP connections. A
sufficiently large number of connections can consume all of the server's resources and
prevent the server from accepting clean traffic.
These settings are available for the Generic IPv6 Server type and some of the IPv4 server
types. See “About the Server Types” on page 92.
Enabled and Disabled Click one of these buttons to enable or disable this category
buttons for a protection level.
n TCP SYN
n slow HTTP post
n protocol
The TCP Connection Reset settings also can protect against the exhaustion of TCP
connection resources that occur when server connection tables are filled. These problems
can be caused by idle TCP connections or user-initiated actions such as bulk content
downloads and peer-to-peer file hosting.
These settings are available for the Generic IPv6 Server type and some of the IPv4 server
types. See “About the Server Types” on page 92.
If a TCP connection does not meet these requirements, APS resets the connection. Also, if
any source host exceeds the configured number of consecutive violations, APS
temporarily blocks the host.
You cannot manually configure the ports for the TCP Connection Reset settings.
Enable TCP Click one of these buttons to enable or disable this category.
Connection Reset
buttons
Minimum Request Type the minimum rate of bits per second that a host must
Bit Rate box maintain when sending an individual request. APS checks
several times per minute to verify that the transmitted data
does not fall below this limit.
If the data rate falls below this limit for a minimum of 60
seconds, APS resets the connection or blocks the host.
TCP Connection Type the number of seconds that must elapse before an idle
Idle Timeout box connection is reset or blocked. For the medium and high
protection levels, the default value is 120 seconds.
There is no default value for the low protection level.
Track Connections Click Enabled to track a connection after it leaves the initial
After Initial State state.
check box
TCP Connection Type the number of seconds that a connection can be idle after
Initial Timeout box it is first established before it is blocked.
Initial Timeout Type the number of bytes that a host must send within the
Required Data box initial timeout period for the timeout to be canceled.
For example, the default TCP Connection Initial Timeout is
10 seconds and the default Initial Timeout Required Data is
1 byte. In this case, the connection has 10 seconds in which to
send 1 byte of data. If the specified amount of data is not sent
within 10 seconds, then the connection is reset.
You can configure the settings for each protection level. See “About the Protection Levels”
on page 86.
The server waits for the ACK responses until it times out. A sufficiently large number of
half-open connections can consume all of the server’s resources and prevent the server
from accepting clean traffic.
Both Spoofed SYN Flood Prevention and TCP SYN Flood Detection protect against SYN
flood attacks. However, while Spoofed SYN Flood Prevention can protect against highly
distributed attacks, TCP SYN Flood Detection uses rate thresholds to detect high rate,
undistributed SYN flood attacks.
n Subtracts the number of ACK packets from the number of SYN packets and compares
the result to the configured SYN ACK Delta Rate.
APS blocks any traffic that exceeds either of these rate limits and temporarily blocks the
source host.
Enable SYN Flood Click one of these buttons to enable or disable this category.
Detection buttons
SYN ACK Delta Type the allowable difference between the number of ACK
Rate box packets and the number of SYN packets (SYN - ACK = delta). This
rate should be lower than the SYN Rate.
In clean traffic, the number of ACK packets from a specific
source should exceed or be slightly less than the number of SYN
packets from that source. This threshold represents the
allowable difference between the two types of packets and
allows APS to detect attackers that send only SYN packets.
To disable this setting, leave this box empty.
SYN Rate box Type the number of packets per second that a source can send
before it is blocked.
In a data center environment, a client typically does not establish
a large number of connections per second. This threshold
allows APS to detect very blatant SYN floods based on the
number of connection requests from a single source.
To disable this setting, leave this box empty.
The SSL (Secure Socket Layer) and TLS (Transport Layer Security) encryption protocols
underlie secure services on the internet. Because these protocols are resource intensive,
the services that rely on them are particularly vulnerable to resource exhaustion attacks.
During these attacks, clients send small requests that force the server to perform a
disproportionately large amount of work to set up a secure session.
The TLS Attack Prevention settings enforce correct protocol usage and block malformed
SSL and TLS requests. These settings also block clients that attempt to exploit the
protocols to exhaust server resources.
You can configure the settings for each protection level. See “About the Protection Levels”
on page 86.
If any of these evaluations fails, APS blocks the request and temporarily blocks the source
host.
Enabled and Disabled Click one of these buttons to enable or disable this
buttons category.
The Traffic Shaping protection settings are available for all of the IPv4 server types and for
the Generic IPv6 Server type. See “About the Server Types” on page 92.
Note
Traffic shaping is also known as rate limiting.
Caution
Traffic shaping restricts clean traffic and attack traffic equally.
If you enable this category, you must set at least one of the maximum rate settings.
Enable Traffic Click one of these buttons to enable or disable this category.
Shaping buttons
Maximum bps box Type the maximum amount of traffic (in bps) to allow.
Maximum pps box Type the maximum amount of traffic (in pps) to allow.
You can configure the settings for each protection level. See “About the Protection Levels”
on page 86.
APS inspects the UDP traffic that originates from a single source and records the bits per
second and packets per second. It blocks any traffic that exceeds the configured rate
limits. If the protection level is medium or high, it temporarily blocks the source host.
Enable UDP Flood Click one of these buttons to enable or disable this
Detection buttons category.
Maximum bps box Type the maximum amount of traffic (in bps) to allow
from a single source.
Maximum pps box Type the maximum amount of traffic (in pps) to allow
from a single source.
Filter lists allow you to configure fingerprint expression (FCAP) filters (rules) that drop and
pass traffic without further inspection. You can configure two types of filter lists.
Master filter lists compare the FCAP expressions to all protection group traffic across all
protection levels.
Filter lists compare FCAP expressions only to traffic for specific server types or the
outbound threat filter. These filter lists also allow you to configure different expressions
for each protection level.
In APS Console, you can configure both types of filter lists for multiple APS devices.
In this section
This section contains the following topics:
Note
If you manage multiple APS devices with APS Console, you can configure filter lists on
APS Console for the managed APS devices.
There are two master filter lists: a list for IPv4 protection groups and a list for IPv6
protection groups. Each time you edit a master filter list, APS applies the updated list to all
IPv4 protection groups or all IPv6 protection groups. APS also automatically applies the
master filter lists to new protection groups that you add.
Filter lists for specific server types or the outbound threat filter
You can configure filter lists for specific server types. This type of filter list compares drop
and pass FCAP expressions to traffic for protection groups that are associated with a
specific server type. These filter lists let you configure different expressions for each
protection level. See “About the Protection Levels” on page 86.
You also can configure filter lists that compare FCAP expressions to outbound traffic. See
“Configuring the Outbound Threat Filter” on page 115.
Use these filter lists to mitigate threats based on specific situations. For example, if the
mitigation protects a server group that obtains content from other sources, then add the
connections to those other sources to a pass rule. Because you know that those
connections are legitimate, you can exempt them from further inspection.
See “Configuring Filter Lists for Specific Server Types or the Outbound Threat Filter” on
page 164.
Order of evaluation
APS evaluates the items to drop and pass on master filter lists, filter lists, and the blacklist
and whitelist in the following order:
n the host blacklist and the whitelist
n Passes the traffic from 192.0.2.11, because it falls within the 192.0.2.0/24 address range.
Therefore, the traffic from this address cannot be dropped.
Important
If a drop FCAP expression matches inbound traffic, APS drops the matching traffic for
active protection groups only. See “Setting the Protection Mode (Active or Inactive)” on
page 84.
You also can configure filter lists that apply to a specific server type only or to the
outbound threat filter. These filter lists drop and pass inbound traffic and outbound traffic.
See “Configuring Filter Lists for Specific Server Types or the Outbound Threat Filter” on
page 164.
Caution
When you connect an APS device to APS Console, the master filter lists on APS Console
replace the master filter lists on APS. Thereafter, any changes to the master filter lists on
APS Console are periodically copied to each APS. See “1About the APS Console - APS
Data Synchronization” on page 78.
If you make local changes on an APS device that is managed by APS Console, those
changes are not copied to APS Console. As a result, any local changes that you make on
APS are lost because the configurations from APS Console overwrite the configurations
on APS. Generally, you should not edit the configurations locally on a managed APS.
6. If the Audit Trail window appears, type a message for the audit trail or accept your
default message, if any.
All the port 22 traffic from 192.0.2.0/24 passes automatically, and APS blocks the other port
22 traffic automatically.
You also can use filter list settings to drop and pass outbound traffic. To compare FCAP
expressions in a filter list to outbound traffic, you configure the filter list settings for the
outbound threat filter. See “Configuring the Outbound Threat Filter” on page 115.
If a drop FCAP expression matches inbound traffic, then APS drops the matching traffic for
active protection groups only. If a drop FCAP expression matches outbound traffic, then
APS drops the matching traffic only when the outbound threat filter is enabled. See
“Setting the Protection Mode (Active or Inactive)” on page 84.
The Filter List protection settings are available for all of the IPv4 server types and for the
Generic IPv6 Server type. See “About the Server Types” on page 92.
Note
You can configure master filter lists that compare drop and pass FCAP expressions to
traffic for all protection groups. See “Configuring Master Filter Lists” on page 162.
Configuring and editing filter lists for the outbound threat filter
To configure or edit a filter list for the outbound threat filter:
1. Select Protect > Inbound Protection > Outbound Threat Filter.
2. On the Outbound Threat Filter page, click Filtering.
3. Select the Enable Outbound Threat Filter check box.
4. In the Filter FCAP Expressions boxes, enter the FCA expressions that correspond to
the data to match. Enter expressions to match IPv4 IP addresses, IPv4 CIDRs, and
other traffic attributes. You can enter expressions for each protection level.
Include a drop or pass keyword to specify the action to take on the matched data. If
you do not include a keyword, then APS considers it a drop action.
Type one expression per line. To include a comment, type a number sign (#) at the
beginning of each comment line.
See “FCAP Expression Reference” on page 344.
5. To edit the filter list, enter new expressions or delete the existing expressions in the
Filter FCAP Expressions boxes.
6. Click Save.
7. If the Audit Trail window appears, type a message for the audit trail or accept your
default message, if any.
All the port 22 traffic from 192.0.2.0/24 passes automatically, and APS blocks the other port
22 traffic automatically.
APS uses blacklisting to protect your network from malicious traffic, and it uses whitelisting
to allow trusted traffic.
In this section
This section contains the following topics:
You can create and manage the following types of blacklists and whitelists:
Inbound whitelist Passes the inbound traffic that originates from Hosts (both
specific hosts. IPv4 and IPv6),
countries, and
domains
Outbound Blocks the traffic that is sent from specific internal Hosts and
blacklist hosts or to specific external hosts. Also blocks the countries (IPv4
traffic that originates from your network and is only)
sent to specific countries.
Outbound Passes the traffic that originates from your Hosts (IPv4
whitelist network and is sent from specific hosts or to only)
specific hosts.
Note
The Invalid Packets category takes precedence over the whitelist and blacklist. As a result,
APS blocks invalid packets from whitelisted hosts. Also, any traffic from hosts on the
blacklist or whitelist that matches invalid packets is attributed to invalid packets in the
Attack Categories graphs.
APS combines the blacklist items and the whitelist items and stores them in a blacklist-
whitelist table, based on protocol. If an APS is managed by APS Console, any blacklist
items and whitelist items that are added in APS Console also are stored in the blacklist-
whitelist table. See “About the Capacity of the Blacklists and Whitelists” on page 172.
When you first connect an APS device to an APS Console, the blacklists and whitelists on
APS Console are copied to APS. Any blacklists or whitelists that were already on APS are
merged with the items from APS Console. Thereafter, any changes to the blacklists and
whitelists on APS Console are periodically copied to each managed APS device as
appropriate.
Caution
If you make local changes on an APS device that is managed by APS Console, those
changes are not copied to APS Console. As a result, any changes that you make on an
APS are lost because the configurations from APS Console overwrite the configurations
on APS. Generally, you should not edit the configurations locally on a managed APS.
Note
On the Outbound Blacklists page and the Outbound Whitelists page, you can blacklist
and whitelist IPv4 addresses only.
All protection The traffic that is destined for all protection groups on an APS.
groups
Typically, the options to blacklist or whitelist IPv4 items for a specific protection group are
available on the pages that contain protection-group-level information. For example, on
the View Protection Group page, when you click the Blacklist button, the following
options appear: All PGs and For this PG.
When the items from the blacklist or whitelist appear throughout the UI, the associated
protection group information is displayed.
Note
Outbound traffic is not associated with protection groups.
Unblocking an item removes it from the blacklist but does not add it to the whitelist.
After you blacklist, whitelist, or unblock an item in APS Console, the change is applied to
APS during the next synchronization. See “1About the APS Console - APS Data
Synchronization” on page 78.
2600 6,400
2100 6,400
vAPS 2,000
The maximum number of IP addresses and CIDRs that APS stores in the IPv6 blacklist-
whitelist table is as follows. This total includes the items on the blacklist and whitelist for
inbound traffic.
2600 2,036
2100 4,072
vAPS 1,272
For domains, URLs, and countries, you can blacklist a combined total of 5,000 items.
For general information about the blacklists and whitelists, see “About Blacklisting and
Whitelisting Traffic” on page 168 .
When the addition of an item causes APS Console to exceed the capacity of its blacklist-
whitelist table, APS Console treats that item as follows:
n The excess item is added to the blacklist or whitelist on APS Console, but it is marked as
disabled and does not affect any traffic.
n The disabled item appears on the blacklist page or whitelist page in the APS Console UI,
but it is dimmed. You can delete the item as needed.
n When a non-disabled item is deleted from a blacklist or whitelist, space can become
available for the addition of a disabled item. APS Console finds the oldest disabled item
and enables it. A global inbound item is enabled for all of the protection groups; a
protection group-specific item is enabled for that protection group only.
How synchronization between APS Console and APS affects the capacity
During the synchronization of the blacklists and whitelists between APS Console and APS,
either APS Console or APS can exceed the capacity of the IPv4 blacklist-whitelist table. For
example, a global item on APS Console can combine with the existing items on APS to
exceed the capacity on APS. When an item from APS Console causes APS to exceed the
capacity, the new item is not added to APS.
During the initial synchronization, if the addition of existing items from APS to APS Console
causes APS Console to exceed the capacity, the following events occur:
n The item is added to APS Console, but is disabled.
n On APS, the item that caused APS Console to exceed its capacity is deleted.
n Other APS devices do not obtain the disabled item during synchronization, even if they
have the capacity to accept the item.
For example, a disabled inbound item might apply to a specific protection group. Even
if the protection group is assigned to an APS that is below its capacity, that APS does not
obtain the disabled item.
n When APS Console enables an item that was disabled, the item is applied to all of the
appropriate APS devices.
You can configure the blacklists in APS Console and propagate the configurations to each
managed APS as appropriate. You also can view the items that were added to the inbound
blacklist from APS Console and on all the APS devices that APS Console manages. See
“Viewing and Searching the Inbound Blacklist” on page 177.
For general information about blacklisting, see “About Blacklisting and Whitelisting
Traffic” on page 168 .
Caution
Because the configurations from APS Console can overwrite the configurations on APS,
any local changes that you make on APS might be lost. Generally, you should not edit the
configurations locally on a managed APS.
n by the country
n by the domain or URL that is specified in the HTTP request header
If the blacklists or whitelists contain an IP address and a CIDR that overlaps that IP
address, the most specific address always takes precedence. For example, if the IP
address 10.2.3.141 is on the whitelist, and you blacklist the CIDR 10.2.3.0/24, the IP address
remains whitelisted.
If you whitelist a host or remove a host from the blacklist, and that host is temporarily
blocked, it is removed from the Temporarily Blocked Sources list immediately. When you
do the same for a CIDR that contains temporarily blocked hosts, those hosts are removed
from the Temporarily Blocked Sources list within five minutes. You can unblock an
individual IP address immediately by whitelisting that IP address.
4. If the Audit Trail window appears, type a message for the audit trail or accept your
default message, if any.
This audit trail information will be visible from the Inbound Blacklists page.
4. If the Audit Trail window appears, type a message for the audit trail or accept your
default message, if any.
This audit trail information will be visible from the Inbound Whitelists page.
You also can use the Inbound Blacklists page to blacklist inbound traffic for all of the
managed APS devices. See “Blacklisting Inbound Traffic” on page 174.
A search for any of the items on the Source IP Address tab returns any blacklisted IP
addresses, CIDRs, or countries that are associated with that address.
4. Click Search .
5. If an item that you searched for is not on the inbound blacklist, a message appears.
The following options might be available:
l You can click (add) in the message to add that item to the blacklist.
l (Source IP Address tab only) If the host is on the inbound whitelist, you can click
the link in the message to open the Inbound Whitelists page and display that host.
Domain Name (Domains and URLs tab only) Displays the blacklisted domain.
URLs (Domains and URLs tab only) Displays the blacklisted URL.
Since Indicates the amount of time that the item has been on the
inbound blacklist.
(information) Displays the audit trail entry, if any, that was created when this item
was added to the list. Click next to the time period in the Since
column.
PGs Affected Displays the protection groups for which the item is blacklisted.
When multiple protection groups are listed, you can hover your
mouse pointer over a protection group to display (Remove ).
Click to remove the item from the blacklist for that protection
group only.
Whitelist button Allows you to add the item to the inbound whitelist.
Because you only can whitelist hosts, this option is available in the
Blacklisted Hosts section only.
(Remove ) Allows you to remove the item from the inbound blacklist for all of
the protection groups without whitelisting it.
If you whitelist a host or remove a host from the blacklist, and that host is temporarily
blocked, it is removed from the Temporarily Blocked Sources list immediately. When you
do the same for a CIDR that contains temporarily blocked hosts, those hosts are removed
from the Temporarily Blocked Sources list within five minutes. You can unblock an
individual IP address immediately by whitelisting that IP address.
Note
You cannot add IPv6 traffic to the outbound blacklist.
When you use APS Console to manage APS, you can configure the blacklists in APS
Console and propagate the configurations to each managed APS as appropriate. You also
can view the items that were added to the outbound blacklist from APS Console and on all
of the APS devices that APS Console manages. See “Viewing and Searching the Outbound
Blacklist” on page 182.
For general information about blacklisting, see “About Blacklisting and Whitelisting
Traffic” on page 168 .
Caution
Because the configurations from APS Console can overwrite the configurations on APS,
any local changes that you make on APS might be lost. Generally, you should not edit the
configurations locally on a managed APS.
If the blacklists or whitelists contain an IP address and a CIDR that overlaps that IP
address, the most specific address always takes precedence. For example, if the IP
address 10.2.3.141 is on the whitelist, and you blacklist the CIDR 10.2.3.0/24, the IP address
remains whitelisted.
If you whitelist a host or remove a host from the blacklist, and that host is temporarily
blocked, it is removed from the Temporarily Blocked Sources list immediately. When you
do the same for a CIDR that contains temporarily blocked hosts, those hosts are removed
from the Temporarily Blocked Sources list within five minutes. You can unblock an
individual IP address immediately by whitelisting that IP address.
you want to move a host from the outbound blacklist to the outbound whitelist, see
“Whitelisting blacklisted hosts” below.
To delete an item from the outbound blacklist:
1. Select Protect > Outbound Protection > Blacklists.
2. On the Outbound Blacklists, click (Remove ) to the far right of the item.
3. If the Audit Trail window appears, type a message for the audit trail or accept your
default message, if any.
Note
The outbound blacklist does not include IPv6 addresses.
You also can use the Outbound Blacklists page to blacklist outbound IPv4 traffic on any
APS device that is managed by APS Console. See “Blacklisting Outbound Traffic” on
page 180 .
Important
You must enable the outbound threat filter for the outbound blacklist to take effect. See
“Configuring the Outbound Threat Filter” on page 115.
For each blacklisted item, the Outbound Blacklists page displays the following information:
Since Indicates the amount of time that the item has been on the
outbound blacklist.
(information) Displays the audit trail entry, if any, that was created when this item
was added to the list. Click next to the time period in the Since
column.
Whitelist button Allows you to add the item to the outbound whitelist.
(Remove ) Allows you to remove the item from the outbound blacklist without
adding it to the outbound whitelist.
If you whitelist a host or remove a host from the blacklist, and that host is temporarily
blocked, it is removed from the Temporarily Blocked Sources list immediately. When you
do the same for a CIDR that contains temporarily blocked hosts, those hosts are removed
from the Temporarily Blocked Sources list within five minutes. You can unblock an
individual IP address immediately by whitelisting that IP address.
When you use APS Console to manage APS, you can configure the whitelists in APS
Console and propagate the configurations to each managed APS as appropriate.
For general information about whitelisting, see “About Blacklisting and Whitelisting
Traffic” on page 168 .
Whitelisting exception
An exception to the whitelisting behavior is when APS detects invalid packets. Because the
Invalid Packets protection takes precedence over the whitelist, APS blocks invalid packets
even if the source host is whitelisted. See “Invalid Packets” on page 202.
If the blacklists or whitelists contain an IP address and a CIDR that overlaps that IP
address, the most specific address always takes precedence. For example, if the IP
address 10.2.3.141 is on the whitelist, and you blacklist the CIDR 10.2.3.0/24, the IP address
remains whitelisted.
When you whitelist a host that is temporarily blocked, it is removed from the Temporarily
Blocked Sources list immediately. When you do the same for a CIDR that contains
temporarily blocked hosts, those hosts are removed from the Temporarily Blocked
Sources list within five minutes. You can unblock an individual IP address immediately by
whitelisting that IP address.
You also can use the Inbound Whitelists page to whitelist inbound traffic for all of the
managed APS devices. See “Whitelisting Inbound Traffic” on page 184.
For each whitelisted item, the Inbound Whitelists page displays the following information:
Since Indicates the amount of time that the item has been on the
inbound whitelist.
(information) Displays the audit trail entry, if any, that was created when this item
was added to the list. Click next to the time period in the Since
column.
PGs Affected Displays the protection groups for which the item is whitelisted.
When multiple protection groups are listed, you can hover your
mouse pointer over a protection group to display (Remove ).
Click to remove the item from the whitelist for that protection
group only.
Blacklist button Allows you to add the item to the inbound blacklist.
(Remove ) Allows you to remove the item from the inbound whitelist for all
the protection groups without blacklisting it.
When you use APS Console to manage APS, you can configure the whitelists in APS
Console and propagate the configurations to each managed APS as appropriate.
Important
You must enable the outbound threat filter for the outbound whitelist to take effect. See
“Configuring the Outbound Threat Filter” on page 115.
For general information about whitelisting, see “About Blacklisting and Whitelisting
Traffic” on page 168 .
Whitelisting exception
An exception to the whitelisting behavior is when APS detects invalid packets. Because the
Invalid Packets protection takes precedence over the whitelist, APS blocks invalid packets
even if the source host is whitelisted. See “Invalid Packets” on page 202.
Note
You cannot add IPv6 traffic to the outbound whitelist.
If the blacklists or whitelists contain an IP address and a CIDR that overlaps that IP
address, the most specific address always takes precedence. For example, if the IP
address 10.2.3.141 is on the whitelist, and you blacklist the CIDR 10.2.3.0/24, the IP address
remains whitelisted.
When you whitelist a host that is temporarily blocked, it is removed from the Temporarily
Blocked Sources list immediately. When you do the same for a CIDR that contains
temporarily blocked hosts, those hosts are removed from the Temporarily Blocked
Sources list within five minutes. You can unblock an individual IP address immediately by
whitelisting that IP address.
Important
When you deploy APS in monitor mode, the outbound traffic does not go through APS
and is not analyzed.
4. If the Audit Trail window appears, type a message for the audit trail or accept your
default message, if any.
This audit trail information will be visible from the Outbound Whitelists page.
You also can use the Outbound Whitelists page to whitelist outbound IPv4 traffic on any
APS device that is managed by APS Console. See “Whitelisting Outbound Traffic” on
page 188 .
You must enable the outbound threat filter for the outbound whitelist to take effect. See
“Configuring the Outbound Threat Filter” on page 115.
Note
The outbound whitelist does not include IPv6 addresses.
recent items. You also can sort the outbound whitelist by the Hosts column. For
information about sorting, see "Sorting information in tables" on page 24 .
For each whitelisted item, the Outbound Whitelists page displays the following
information:
Since Indicates the amount of time that he item has been on the
outbound whitelist.
(information) Displays the audit trail entry, if any, that was created when this item
was added to the list. Click next to the time period in the Since
column.
Blacklist button Allows you to add the item to the outbound blacklist.
(Remove ) Allows you to remove the item from the outbound whitelist
without adding it to the outbound blacklist.
This section describes the many ways in which you can view the traffic that APS inspects.
In this section
This section contains the following topics:
Use the information on this page to monitor how effectively the managed APS devices
mitigate attacks and to decide whether you need to take action to block the traffic.
The View Protection Group page displays aggregated traffic data for all of the APS devices
that are assigned to the protection group. You can filter the data on the View Protection
Group page to view information for a single APS. See “Filtering the traffic data for a single
APS” on page 199.
The View Protection Group page also allows you to blacklist certain hosts or remove them
from the blacklist, which is also referred to as unblocking. See “About Blacklisting and
Whitelisting Traffic” on page 168.
Bytes and Click Bytes or Packets to change the display unit of measure on
Packets buttons the View Protection Group page.
Protection Group Displays summary data about all of the protection group’s traffic
Overview during the selected timeframe.
See “Viewing the Traffic Overview for a Protection Group” on
page 197.
Total Protection Shows a stacked graph that represents the total passed traffic in
Group Traffic green and the total blocked traffic in red. Below the graph, you can
graph click (Passed) or (Blocked) to show and hide the different
types of traffic.
Attack Categories See “Viewing the Attack Categories for a Protection Group” on
page 200.
You can click (collapse) to hide the list of traffic views. When the list is hidden, the graph
and table continue to display the data for the selected type of traffic.
The types of traffic that are available in the list depend on the server type for the protection
group. For example, when you display this page for a Web Server protection group, only
the sections that are relevant for Web servers appear.
The list of traffic views can include the following types of traffic:
Web Traffic by URL Displays the 10 URLs that have the highest amounts of inbound
IPv4 traffic.
See “Viewing the Top URLs for a Protection Group” on page 206.
Note
This traffic data is not available for IPv6 protection groups.
IP Location Displays the 10 identifiable countries that send the most IPv4
traffic.
See “Viewing the Top IP Locations for a Protection Group” on
page 210.
Note
This traffic data is not available for IPv6 protection groups.
Services Displays the 10 services that have the highest amounts of inbound
traffic.
See “Viewing the Top Services for a Protection Group” on
page 214.
Use the information in this section to quickly view the protection group’s activity, assess its
performance, and look for problems. For example, a significant increase or a large spike in
the passed traffic might indicate an attack.
To view information in real time about the traffic that is destined to a protection group, see
“Viewing the Traffic Activity for a Protection Group” on page 194 .
Passed Traffic Displays a minigraph that represents the passed traffic, and
displays the following values:
n Total summarizes the total amount of passed traffic during the
specified timeframe.
n Rate summarizes the average rate of the passed traffic during
the specified timeframe.
Blocked Hosts Displays a minigraph that represents the blocked hosts. The
Average value indicates the average number of blocked hosts
during the specified timeframe.
Total Traffic Shows the percentage of the total traffic that is passed in green and
graph the percentage that is blocked in red.
The data display for the attack categories refreshes approximately every 60 seconds.
Use this information to determine why APS blocked the traffic. For example, if blocked
traffic is shown for the Invalid Packets category, you can display the details for that
category to view the reasons why that traffic was considered to be invalid.
For general information about the protection settings, see “About the Protection Settings
Configuration” on page 111 .
Key Shows the color that represents the source in the Attack
Categories graph and allows you to filter the graph display. Click
the key for an attack category to hide or show that category on the
graph.
APS Console retains your selections until you navigate away from
the View Protection Group page.
Graph Represents the traffic that the category blocks. You can hover your
mouse pointer over the minigraph to view a larger version of the
graph.
(context menu) Appears when you hover your mouse pointer over an attack
category name. You can click , and then select Blocked Hosts to
display the Blocked Hosts Log page for this protection group and
attack category.
See “About the Blocked Hosts Log” on page 260.
Bytes blocked Shows the amount of blocked traffic for the attack category in
Packets blocked bytes and packets.
bps blocked Shows the rate of blocked traffic for the attack category in bits per
pps blocked second and packets per second.
Details button Allows you to view additional information about the blocked
traffic. The information that APS displays varies for each attack
category. Detailed information is not available for all of the attack
categories.
You can hide the details by clicking Details again.
Non-configurable categories
Category Description
Blacklisted Hosts The Blacklisted Hosts category represents the hosts that are
blocked because they are on the blacklist. You can configure the
blacklists on the Configure Inbound Blacklists page and the
Configure Outbound Blacklist page.
Note
The Invalid Packets category takes precedence over blacklists. As
a result, any traffic from blacklisted hosts that matches invalid
packets is attributed to invalid packets in the Attack Categories
graphs.
HTTP Blocked The HTTP Blocked Locations category represents the following
Locations hosts and domains:
n The domains that were blocked because they are on the
inbound blacklist
n The blocked hosts that appear in the Web Traffic By URL section
on the View Protection Group page
n The blocked domains that appear in the Web Traffic By Domain
section on the View Protection Group page
Invalid Packets The Invalid Packets category blocks invalid TCP/IP packets. Click
Details for this category to view the reasons that APS blocked the
packets.
Note
The Invalid Packets category takes precedence over the whitelist
and blacklist. As a result, APS blocks invalid packets from
whitelisted hosts. Also, any traffic from hosts on the blacklist or
whitelist that matches invalid packets is attributed to invalid
packets in the Attack Categories graphs.
Block Malformed Shows statistics about the blocked hosts, including the total
SIP Traffic number of hosts that were blocked. See “About the total hosts
blocked” on page 205.
DNS Shows the number of hosts that were tested and the number of
Authentication hosts that were validated.
DNS NXDomain Shows the average number of hosts and the total number of hosts
Rate Limiting that were blocked. See “About the total hosts blocked” on
page 205.
DNS Rate Limiting Shows statistics about the hosts that were blocked, including the
total number of hosts that were blocked. See “About the total
hosts blocked” on page 205.
HTTP Rate Limiting Shows statistics about the hosts that were blocked and whether
they were blocked for exceeding the request limit or the URL limit.
This section also shows the total number of hosts that were
blocked. See “About the total hosts blocked” on the facing page.
ICMP Flood Shows the average number of hosts that were blocked.
Detection
Invalid Packets Lists the reasons why traffic was considered to be invalid and
shows the amount of traffic that was blocked for each reason. A
traffic minigraph is displayed for each reason, and a stacked graph
summarizes the blocked traffic with one row for each reason.
Malformed HTTP Shows the average number of hosts that were blocked and the
Filtering number of requests that were examined.
SIP Request Shows the average number of hosts and the total number of hosts
Limiting that were blocked. See “About the total hosts blocked” on the
facing page.
Spoofed SYN Flood Shows statistics about the number of hosts that were allowed to
Prevention form connections, the total number of connections, and the total
number of HTTP requests on those connections.
TCP Connection Lists the top 10 hosts whose concurrent TCP connections
Limiting exceeded the rate limit, and shows the amount of traffic that was
blocked for each host. Connection statistics are displayed for each
host.
Important
This section includes traffic for all of the categories that affect
each host, not just the TCP Connection Limiting category.
TCP Connection Shows statistics for the connections and hosts that were blocked,
Reset including the total number of hosts that were blocked. See “About
the total hosts blocked” on the facing page.
TCP SYN Flood Shows the average number of hosts that were blocked.
Detection
TLS Attack Lists the reasons why the SSL or TLS traffic was considered to be
Prevention invalid and shows statistics about the traffic that was blocked for
each reason. You can click Details next to each reason to view the
average number of hosts that were blocked for that reason.
UDP Flood Shows the average number of hosts that were blocked.
Detection
DNS Rate Limiting Shows statistics about the hosts that were blocked, including the
total number of hosts that were blocked. See “About the total
hosts blocked” below.
Malformed HTTP Shows the average number of hosts that were blocked and the
Filtering number of requests that were examined.
Use this information to identify problems or determine the target of an attack. For
example, a URL whose traffic is significantly higher than normal might be under attack.
Also, a URL that has a high percentage of the total HTTP traffic is often an attack target.
Note
This traffic data is not available for IPv6 protection groups.
Key Shows the color that represents the specific URL in the Web Traffic
By URL graph and allows you to filter the graph display.
You can click the key for a URL to hide or show that URL on the
graph. Your selections are retained until you navigate away from
the View Protection Group page.
Graph Represents the number of requests per minute that are sent to the
URL. You can hover your mouse pointer over a minigraph to view
a larger version of the graph.
Requests Displays the number of requests that are sent to the URL.
Percent Displays the percentage of the total HTTP traffic that the traffic for
that URL represents, shown as a figure and as a proportion bar.
The bar for the top URL is the full column width and the remaining
bars are in proportion to it.
Request bps Shows the average rate of the requests that are sent to the URL.
Blacklist button Allows you to add the URL to the inbound blacklist for this
protection group or for all IPv4 protection groups. When you
blacklist a URL, APS blocks all of the IPv4 traffic from the clients
that access the blacklisted URL.
See “About Blacklisting and Whitelisting Traffic” on page 168.
Unblock button Allows you to remove the URL from the inbound blacklist.
This button appears only when a URL has been blacklisted.
Use this information to identify problems or determine the target of an attack. For
example, a domain whose traffic is significantly higher than normal might be under attack.
Also, a domain that has a high percentage of the total HTTP traffic is often an attack target.
The data display for the top domains refreshes approximately every five minutes. The
slower update rate is due to the way each APS collects and averages the domain data.
Note
This traffic data is not available for IPv6 protection groups.
Key Shows the color that represents the specific domain in the Web
Traffic By Domain graph and allows you to filter the graph display.
You can click a domain’s key to hide or show that domain on the
graph. Your selections are retained until you navigate away from
the View Protection Group page.
Graph Represents the number of requests per minute that are sent to the
domain. You can hover your mouse pointer over a minigraph to
view a larger version of the graph.
Requests Shows the number of requests that are sent to the domain.
Percent Displays the percentage of the total HTTP traffic that the domain’s
traffic represents, shown as a figure and as a proportion bar. The
bar for the top domain is the full column width and the remaining
bars are in proportion to it.
Request bps Shows the average rate of the requests that are sent to the
domain.
Blacklist button Allows you to add the domain to the inbound blacklist for this
protection group or for all IPv4 protection groups. When you
blacklist a domain, APS blocks all of the IPv4 traffic from the clients
that access the blacklisted domain.
See “About Blacklisting and Whitelisting Traffic” on page 168.
Unblock button Allows you to remove the domain from the inbound blacklist.
This button appears only when a domain has been blacklisted.
The data display for the top IP locations refreshes approximately every 60 seconds.
Note
This traffic data is not available for IPv6 protection groups.
Key Shows the color that represents the country in the IP Location
graph and allows you to filter the graph display.
You can click a country’s key to hide or show the data for that
country on the graph. Your selections are retained until you
navigate away from the View Protection Group page.
Country Displays the name of the country from which the traffic was sent.
The ATLAS Intelligence Feed (AIF) supplies the information that
identifies the country. See “About the ATLAS Intelligence Feed” on
page 52.
Graph Represents the country’s passed traffic (green) and blocked traffic
(red). You can hover your mouse pointer over the minigraph to
view a larger version of the graph.
Passed Traffic Shows the average rate of the passed and blocked traffic for the
Blocked Traffic country.
Percent Bytes Displays the percentage of the total blocked traffic that the
country’s traffic represents, shown as a figure and as a proportion
bar. The bar for the top country is the full column width and the
remaining bars are in proportion to it.
Blacklist button Allows you to add the country to the inbound blacklist for this
protection group or for all protection groups. See “About
Blacklisting and Whitelisting Traffic” on page 168.
Unblock button Allows you to remove the country from the inbound blacklist.
This button appears only when a country has been blacklisted.
This information is provided primarily for informational purposes. However, any traffic on
your network that is unexpected could represent an attack. For example, if you expect
only TCP traffic, but traffic is displayed for the UDP protocol, you should investigate this
traffic.
The data display for the top protocols refreshes approximately every 60 seconds.
Key Shows the color that represents the specific protocol in the
Protocols graph and allows you to filter the graph display.
You can click a protocol’s key to hide or show that protocol on the
graph. Your selections are retained until you navigate away from
the View Protection Group page.
Graph Represents the total traffic for a specific protocol. You can hover
your mouse pointer over a minigraph to view a larger version of
the graph.
Bytes Shows the amount of traffic for the specific protocol in bytes and
Packets packets.
bps Shows the rate of traffic for the specific protocol in bits per second
pps and packets per second.
This information is provided primarily for informational purposes. However, any traffic on
your network that is unexpected could represent an attack. For example, if you expect
only web traffic, but traffic is displayed for SMTP, you should investigate the traffic further.
An ephemeral port is a temporary port, numbered 1024 or greater, that the TCP/IP stack
allocates when a client does not specifically request a port number. When the
communication session terminates, the ephemeral port is available for reuse.
When the display timeframe on the View Protection Group page is more than one week,
the service data for ephemeral ports is displayed by port range. For example, when the
UDP service on port 5000 has a high amount of traffic and the display timeframe is one
hour, that traffic appears as UDP/5000. When the display timeframe is two weeks, that
traffic is included in the entry for UDP/5000-5199.
In the Services graph, the data for ephemeral ports is always displayed by port range,
regardless of the display timeframe.
Graph Represents the total traffic for a specific service. If the service is on
an ephemeral port, the data is always displayed by port range. See
“About service data for ephemeral ports” on the previous page.
You can hover your mouse pointer over a minigraph to view a
larger version of the graph.
Service Displays the name of the protocol and the port or the range of
ports. APS Console also displays the name of the service in
parentheses, if known.
If “Other” appears in this list, it represents the totals for all of the
other services that are not listed here.
APS Console sorts the list of services by bytes, in descending order.
(context menu) Appears when you hover your mouse pointer over a service if the
data on the page is for a single APS. You can select the Packet
Capture option on this menu to capture packets for the
protection group and the service on the selected APS.
When you select Packet Capture , it opens the Packet Capture
page on the selected APS. The protection group and the country
are selected as filter criteria on this page. You can start the packet
capture or you can specify additional filter criteria.
See “About Capturing Packets” on page 274.
bps Shows the rate of traffic for the specific service in bits per second
pps and packets per second.
This section describes how to manage protection groups on APS Console. It also describes
how to add new protection groups and how to assign APS devices to the protection
groups.
User access
Users at all authorization levels can view the protection groups. Only administrators can
perform the configuration tasks that are described in this section. See “About User
Accounts” on page 36.
In this section
This section contains the following topics:
A protection group represents either IPv4 hosts or IPv6 hosts that you need to protect.
Each protection group is associated with a server type and one or more host servers of
that type. For example, a protection group can represent a single web server or a specific
group of DNS servers.
Important
If you use the minimum vAPS configuration, vAPS only supports a maximum of 10
protection groups. Because the default protection group counts toward this maximum,
you can add 9 custom protection groups.
See the “Minimum System Resources” information in the Virtual APS Installation Guide .
You can edit the default protection group, but only to configure its protection mode,
protection level, and bandwidth alert thresholds. You cannot delete the default protection
group.
Note
The default protection group only protects IPv4 hosts. It does not protect IPv6 hosts.
You can configure a custom IPv6 protection group to serve as the default IPv6 protection
group. For an example that illustrates how to create a default protection group for all of
the unprotected IPv6 hosts, see the “IPv6 prefix matching example” on page 221 .
Throughout APS and APS Console, you can monitor traffic and mitigate attacks by
protection group, so that you can focus your attention on your most critical hosts.
We recommend that you create a protection group for each of the services that you want
to protect. See “Adding, Editing, and Deleting Protection Groups” on page 231.
Protected hosts Protection groups monitor and mitigate the traffic that is destined
for one or more host servers. You define the protected hosts by
their prefixes or a set of prefixes.
A protection group can protect either IPv4 hosts or IPv6 hosts. You
cannot add IPv4 hosts and IPv6 hosts to a single protection group.
See “Prefix matching in protection groups” on page 221.
Server type The server type represents a class of servers that APS protects. The
server type determines which protection settings are available for a
protection group and the application-specific data that APS collects
and displays for the group.
When you create an IPv4 protection group, you can select a
standard IPv4 server type or a custom IPv4 server type, if any. When
you create an IPv6 protection group, you can select the Generic
IPv6 Server standard server type or a custom IPv6 server type, if
any.
See “About the Server Types” on page 92.
Protection The protection settings are the criteria by which APS defines clean
settings traffic and attack traffic. For example, if a setting specifies a
threshold based on the number of requests per second, then traffic
that exceeds the threshold is considered to be an attack.
Protection The protection settings are organized into categories, each of which
categories detects a different type of attack traffic. A protection group contains
the categories of settings that are most appropriate for its server
type. For example, a Web Server protection group contains the
HTTP categories of settings, which detect HTTP-based attacks.
Protection mode The protection mode determines whether APS mitigates traffic. In
active mode, APS mitigates attacks in addition to monitoring traffic.
In inactive mode, APS detects attacks but does not mitigate them.
You can set the protection mode for an individual protection group
without affecting any other traffic. For example, you can set a
protection group to inactive mode for testing while keeping the rest
of the system in active mode. See “Setting the Protection Mode
(Active or Inactive)” on page 84.
Before APS Console allows you to assign the APS to another protection group, you must
unassign the APS from at least one protection group.
Caution
If you make local changes on an APS device that is managed by APS Console, those
changes are not copied to APS Console. As a result, any changes that you make on an
APS are lost because the configurations from APS Console overwrite the configurations
on APS. Generally, you should not edit the configurations locally on a managed APS.
When traffic is destined to the IP address 198.51.100.5, APS matches it to Protection Group
2, which is the most specific match.
In the second IPv4 prefix matching example, the protection groups protect the following
IPv4 hosts:
IPv4 default 0.0.0.0/0 All IPv4 traffic, except for the traffic that is
protection group destined to 192.0.2.0/24
You can configure bandwidth alert thresholds globally or for individual protection groups.
The global thresholds are enabled by default. APS uses the global thresholds for any
protection group that does not have its own thresholds configured. The threshold settings
for a specific protection group override the global threshold settings.
You can view bandwidth alerts in several areas of the APS Console UI. See “Viewing a
Summary of Alerts” on page 304.
Blocked traffic Occurs when a protection group’s blocked traffic exceeds the
alert threshold. A spike in blocked traffic typically indicates that an attack
is underway and is blocked.
Blocked traffic alerts inform you of the system’s response to an
attack so that you can respond with further actions. For example, if
you determine that the traffic is legitimate, you can whitelist the
source.
Botnet alert Occurs when a protection group’s unblocked botnet traffic exceeds
the threshold.
Botnet alerts indicate that a botnet attack might be underway and
suggest the protection level that would block the botnet traffic.
License limit alert Occurs when your system’s traffic exceeds 90 percent of its licensed
throughput limit. Your licensed throughput limit is the threshold for
the license limit alerts; this threshold is not user-configurable.
Before APS can evaluate traffic against the baseline thresholds, it must calculate the
baselines based on a protection group’s traffic for the past week. Therefore, the alerts may
not begin to appear until a week after you create a protection group.
After the APS calculates the initial baselines, it recalculates them every hour.
If you specify a minimum threshold, then a protection group’s traffic must exceed both the
baseline threshold and the minimum threshold before APS generates an alert. For
example, a specific protection group’s baseline might be a low level of traffic. If that
group’s traffic suddenly increases by the global percentage, no alerts are created if the
traffic level is still below the minimum threshold.
For more information, see “Configuring Global Thresholds for Bandwidth Alerts” in the
APS User Guide .
n when you change the type of threshold (global threshold or specified traffic threshold)
for a protection group
n when you configure a protection group’s alert threshold to a level that is higher than the
level that triggered the alert
n (botnet alerts only) when the protection level is changed to be greater than or equal to
the level that triggered the alert
You can also add, edit, and delete protection groups on this page. See “Adding, Editing,
and Deleting Protection Groups” on page 231.
Viewing information for each protection group and its assigned APS devices
You can view the following information about each protection group in the list:
n the APS devices that are assigned to that protection group
n the server type and a list of the protected hosts
n the protection level and whether the protection level automation is enabled
n the protection mode
n the traffic that was passed and blocked during the past hour
n the configuration status for the bandwidth threshold alerts
n a description of the protection group, and information about when the protection
group was last modified
If you expand a protection group, you can view the following information about each APS
device that is assigned to the protection group:
n the protection level and whether the protection level automation is enabled
You can filter the list to view only specific protection groups.
Add IPv4 Allow you to add an IPv4 protection group or an IPv6 protection
Protection Group, group.
Add IPv6 See “Adding, Editing, and Deleting Protection Groups” on
Protection Group page 231.
buttons
Protection Group Displays the protection group name in the form of a link. You can
Name column click the link to view the traffic activity for the protection group.
See “Viewing the Traffic Activity for a Protection Group” on
page 194.
This section also displays a list of the protected hosts. If the list
contains more than a few hosts, you can click [more] to view the
entire list. Click [less] to collapse the list.
(protection Appears when you hover your mouse pointer over a protection
group context group name.
menu) You can use the options on the protection group context menu
to perform the following actions:
n Edit or delete the protection group. See “Adding, Editing, and
Deleting Protection Groups” on page 231.
n Manage the APS devices that are assigned to the protection
group. See “Assigning APS Devices to Protection Groups” on
page 237.
n Delete the protection group.
n View the blocked hosts that are related to the protection
group on the Blocked Hosts Log page. See “Viewing the
Blocked Hosts Log” on page 262.
(APS context Appears when you hover your mouse pointer over the name of
menu) an APS.
You can use the options on the APS context menu to perform
the following actions:
n Change the protection group settings for protection level,
protection mode, and threshold alerts for the APS. See
“Overriding a Protection Group’s Settings on a Managed APS”
on page 240.
n View the blocked hosts that are related to the protection
group on the APS. See “Viewing the Blocked Hosts Log” on
page 262.
n Remove the APS from the protection group. See “Assigning
APS Devices to Protection Groups” on page 237.
n Capture information about packets destined for a protection
group’s prefixes on the APS. See “About Capturing Packets”
on page 274.
(cannot retrieve Indicates that APS Console cannot retrieve the data for a
data) protection group minigraph from at least one APS.
To identify the problem, expand the protection group and locate
each APS that has and a No Data message instead of a
minigraph.
You can hover your mouse over to view a warning message.
Server Type column Lists the type of server that the protection group protects, in the
form of a link. You can click the link to view or edit the protection
settings.
See “Changing the Protection Settings for Server Types” on
page 100.
(protection group Indicates an override of the original protection group setting for
setting override) an APS. See “Overriding a Protection Group’s Settings on a
Managed APS” on page 240.
The next to the setting in a protection group row indicates an
override for at least one APS. The next to the setting in an APS
row indicates an override for that APS.
Protection Mode Indicates whether the protection mode for the protection group
column or the APS is Active or Inactive .
See “Setting the Protection Mode (Active or Inactive)” on
page 84.
To view the protection level for the APS devices that are assigned
to a protection group, click (expand) next to the protection
group name.
See “About the Protection Levels” on page 86. For information
about protection level automation, see “About protection level
automation” on page 235 .
(alerts Indicates that one or more of the bandwidth threshold alerts are
configured) configured for the protection group or for an assigned APS.
You can click this icon to view the threshold alert settings in the
Alerts window.
See “About Bandwidth Alerts” on page 223.
(alerts not Indicates that bandwidth threshold alerts are not configured for
the protection group or that the alerts are disabled for an APS
configured)
assignment.
(active alerts) Displays the total number of active bandwidth threshold alerts
for the protection group in the red circle (5 in this example). You
can click this icon to open the Alerts window to view additional
information about the active threshold alerts.
See “About the active threshold alerts” below.
Last Modified Indicates the last time that the protection group or the APS was
column changed by a user or by the system.
(information) Appears in the Last Modified column if there is an audit trail entry
for the last change to the protection group or the APS. You can
click this icon to view the audit trail entry.
To close the information window, click the x.
When you click for a protection group, APS Console displays the following
When you click for an APS, APS Console displays the following information in the
Alerts window:
n the number of active alerts by type for the protection group on that APS
n the protection group’s threshold alert settings and any settings that have been
overridden on that APS
You also can click the View Alerts link in the Alerts window, which opens the Alerts page.
If you click (active alerts) for a protection group, APS Console filters the Alerts page to
display the active alerts for that protection group. If you click (active alerts) for an APS,
APS Console filters the Alerts page to display the active alerts for the protection group on
that APS.
n You can add or remove protected hosts. The default protection group protects any IPv4
hosts that are not assigned to a custom protection group.
n You can rename a protection group, and change its description.
Note
You can override a protection group’s settings for protection mode, protection level,
threshold alerts, and protection level automation on an individual APS. See “Overriding a
Protection Group’s Settings on a Managed APS” on page 240.
When you delete a protection group, APS Console makes the following changes on all of
the APS devices that are assigned to the protection group:
n removes the protection group, and the default protection group protects any of the
IPv4 prefixes that are not assigned to another protection group
Note
The default protection group does not protect IPv6 prefixes.
n removes the items that were blacklisted or whitelisted for that protection group
n removes the protection group from any scheduled reports in which the protection
group is included
Note
APS never removes data from existing reports.
Name box Type a name to identify the protection group throughout the UI.
Protected Hosts You can specify IPv4 hosts and IPv6 hosts in any of the following
box forms:
Server Type list Select the type of server that the protection group protects. The
server type determines the protection settings that are available for
the protection group.
When you create an IPv4 protection group, you can select a
standard IPv4 server type.
When you create an IPv6 protection group, the Generic IPv6
Server server type is selected by default. This server type is the only
standard server type that is available for IPv6 protection groups.
Protection Level Select an icon to set the protection level for the protection group
options (global, low, medium, or high). A check mark in the icon indicates
which level is selected.
The protection level icons are defined as follows:
— Global
— Low
— Medium
— High
If you select the global icon, the protection group uses the APS
protection level. For information about the global protection level,
see “About the Protection Levels” on page 86 . Also, see “Changing
the Protection Level” on page 253 .
Note
To change the protection level for a protection group on a specific
APS, see “Overriding a Protection Group’s Settings on a Managed
APS” on page 240 .
Description box Type a description that can help to identify the protection group.
Detection and Use the settings in this section to configure alerting that is based on
Automation Policy a user-specified traffic threshold or a global traffic threshold. You
section also can automate the protection level for a protection group,
based on the total traffic threshold. See “About protection level
automation” on the facing page.
Total Traffic Select an option to configure the level of total traffic that causes the
options APS to automate the protection level or trigger total traffic alerts for
the protection group:
Blocked Traffic Select an option to configure the level of blocked traffic that causes
options the APS to trigger blocked traffic alerts for the protection group:
Botnet Traffic (IPv4 protection groups only) Select an option to configure the level
options of botnet traffic that causes APS to trigger botnet traffic alerts for
the protection group:
The protection level remains high for at least five minutes. At any time after that, if the
traffic level falls below the threshold, the protection level returns to low.
After APS Console synchronizes with the managed APS devices, the protection group's
protection level is set to low on each APS that is assigned to the protection group.
However, after the synchronization, APS Console no longer controls the protection group’s
protection level on the APS devices.
Instead, on the List Protection Groups page, the Protection Level column for each APS
displays the current state of the protection level on that APS.
You also can disable the automation by changing the total traffic setting to an alerting
option or by turning off the automation and alerting. In this case, the protection level is set
to low on all of the APS devices, even APS devices that are at the high protection level.
To disable the protection level automation on a single APS, see “Overriding a Protection
Group’s Settings on a Managed APS” on page 240 .
Caution
If you make local changes on an APS device that is managed by APS Console, those
changes are not copied to APS Console. As a result, any changes that you make on an
APS are lost because the configurations from APS Console overwrite the configurations
on APS. Generally, you should not edit the configurations locally on a managed APS.
The maximum number of custom protection groups to which you can assign APS
depends on the APS device, as shown in the following table.
2600 99
2100 49
2000 49
vAPS 49
Note
For information about the vAPS minimum configuration, see the Virtual APS Installation
Guide .
All of the APS devices that APS Console manages are assigned automatically to the default
protection group. However, the default protection group only protects IPv4 prefixes. The
default protection group does not protect IPv6 prefixes.
After you assign at least one APS device to a protection group, you can view the protection
group traffic on the View Protection Group page. See “Viewing the Traffic Activity for a
Protection Group” on page 194.
You can override the protection group settings for protection level, protection mode, and
threshold alerts on any managed APS. See “Overriding a Protection Group’s Settings on a
Managed APS” on page 240.
User access
Only administrators can assign APS devices to, or remove APS devices from, protection
groups. See “About User Groups” on page 38.
2. (Optional) In the Manage APS Assignments window, type a string in the Filter List
box to filter the APS names in the Available list.
The Available and Assigned lists display up to 25 characters of an APS name. If an APS
name exceeds 25 characters, hover your mouse pointer over it to view the entire
name.
3. Assign APS devices to the protection group in one of the following ways:
To assign individual APS a. Select the APS names in the Available list.
devices b. Click Assign .
To assign a single APS device Double-click the name in the Available list.
4. Click Save.
If a prefix in the protection group is included in a protection group that is already
assigned to a selected APS, you cannot save the assignments. You also cannot save
the assignments if a selected APS is assigned to its maximum number of protection
groups. To proceed, unassign any APS devices that cannot be assigned or click
Cancel.
5. If the Audit Trail window appears, type a message for the audit trail or accept your
default message, if any.
To unassign a single APS Double-click the APS name in the Assigned list.
device
7. Click Save.
8. If the Audit Trail window appears, type a message for the audit trail or accept your
default message, if any.
Indicator of an override
To indicate the override of a protection group setting, APS Console displays (protection
group override) next to the setting on the List Protection Groups page.
The in a protection group row indicates that there is an override for the setting on at
least one APS device. The in the row for an APS device indicates that there is an override
for the setting on that APS.
APS blocks attacks automatically based on the protection settings that define malicious
traffic. However, certain attacks may require that you take action to block them. This
section describes how to respond to attacks that are not blocked automatically.
In this section
This section contains the following topics:
Caution
Because the configurations from APS Console can overwrite the ones on APS, any local
changes that you make on APS might be lost. Generally, you should not make local
changes on a managed APS, although you might occasionally need to do so. For
example, you might lose the connection between APS Console and an APS during a high-
volume DDoS attack. In that case, you can make local changes on the APS to mitigate the
attack.
Raise the You can try to mitigate an attack by raising the global protection
protection level. level or the protection group protection level. Use this option when
you have little time or knowledge of network security and you
need to stop an attack as quickly as possible. Alternatively, you
might raise the protection level only after other attempts to
mitigate an attack are unsuccessful. See “Mitigating an Attack by
Raising the Protection Level” on page 251.
Remember that the risk of blocking clean traffic increases with the
level of protection. For information about the protection levels and
the protection and risk that are associated with each one, see
“About the Protection Levels” on page 86.
Identify and block If you can identify the source of an attack, you can block its traffic
specific attack in the following ways:
traffic. n Blacklist the traffic source.
n Create a regular expression to match the traffic and enter it in
the appropriate protection setting.
n Create an FCAP expression to match the traffic and enter it in
the appropriate protection setting.
Edit the protection If you can identify the type of attack, you can try to block it by
settings. changing the protection settings that typically block that type of
attack. See “Changing the Protection Settings for Server Types” on
page 100.
For example, your network experiences an ICMP flood but APS
does not detect it. If you can block the attack by changing the
Maximum Request Rate for the target protection group, you
can avoid changing the protection level.
Regular monitoring can help you to learn about your network’s normal traffic levels so that
you can more easily recognize anomalies. Regular monitoring can also help you to detect
the attacks that are not mitigated automatically. As you learn more about those types of
attacks, you can refine the protection settings so that APS can detect and mitigate them
according to your preferences.
When you use APS Console to manage APS, you can perform these tasks for multiple APS
devices or multiple protection groups.
Workflow
Your APS monitoring workflow should allow you to answer the following questions:
If you use APS Console In APS Console, view the connection status and
to manage APS, is the synchronization status for each managed APS in the System
APS connected and Information section on the Summary page.
synchronized?
Is the ATLAS Intelligence On the Configure AIF Settings page, view the status of the AIF
Feed (AIF) update update. On the Change Log page, view the update
working? information. See “Viewing the Status of ATLAS Intelligence
Feed Updates” on page 62.
Is the network under an APS can proactively inform you of attacks and other traffic
attack that APS is not anomalies that require your attention. If you have enabled
blocking? thresholds for total traffic alerts or botnet alerts, an alert
occurs when a protection group’s traffic exceeds one of the
thresholds. These alerts appear on the System Alerts page as
well on other pages in the UI.
In the absence of alerts, you can view specific pages in the UI
for information that can help you to detect an attack. See
“Indicators of Attacks and Mitigations” on page 248.
If you have enabled alert thresholds, an alert can be the first sign that you are under
attack, in addition to any external indications. See “Alerts that indicate attacks” below and
“External attack symptoms” on page 250 .
Whether or not you receive an alert, you can view the extensive traffic statistics that appear
in APS Console. In particular, you can view the traffic graphs that provide a quick visual
indication of the state of your network traffic. Additional statistics provide more details
about the data that is provided in the graphs. See “Graphic indicators of an attack” on the
facing page.
For general information about mitigation, see “About Attack Mitigation” on page 244 .
Each alert includes information that can help you to investigate the alerting behavior
further. The information varies by the type of alert. For example, an alert might include the
protection group name, the blocked host IP address, or a URL to the page where you can
view further information.
When you use APS Console to manage APS, you can view the alerts for multiple APS
devices. To do so, view the Dashboard page or the Alerts page (Explore > Alerts) in APS
Console.
In APS Console, these graphs typically represent an aggregate of the inbound traffic for
multiple protection groups or multiple APS devices.
Depending on where the graph appears, the traffic might appear in a color other than
blue, and the graph might display stacked data.
n On the List Protection Groups page, in the minigraphs for the protection groups and
appliances
n On the View Protection Group page, in the following sections: Total Protection Group
Traffic and IP Location
If you experience any of these symptoms, use the APS Console UI to investigate.
You can try to mitigate an attack by raising the global protection level or the protection
group protection level. Use this option when you have little time or knowledge of network
security and you need to stop an attack as quickly as possible. Alternatively, you might
raise the protection level only after other attempts to mitigate an attack are unsuccessful.
For additional mitigation options, see “About Attack Mitigation” on page 244 .
The more finely tuned your protection settings are, the more successful this method of
blocking traffic will be.
On APS Console, you can change the protection level for a protection group. The new
protection level setting is then synchronized on all of the APS devices assigned to that
protection group.
1 Does the attack affect all of the APS devices that are assigned to the protection
group?
n Yes — In the following steps, change the protection level for the protection
group. This setting is synchronized on all of the APS devices that are assigned
to the protection group. See “1About the APS Console - APS Data
Synchronization” on page 78.
n No — If the protection group is under attack on a specific APS, then in the
following steps, change the protection level for that APS.
If the attack is not blocked sufficiently, then change the protection level to High .
3 At the higher protection levels, APS might block valid hosts and services, such as
email servers, DNS servers, database servers, or VPNs.
When you raise the protection level, view the Blocked Hosts Log page. If you
identify a valid host, whitelist it by clicking its Details button, and then clicking
Whitelist in the Blocked Host Detail window . See “Viewing the Blocked Hosts
Log” on page 262.
5 Follow your organization’s procedure for escalating the attack mitigation. This
procedure might include requesting cloud mitigation.
6 When the level of traffic returns to normal, it indicates that the attack stopped,
and you can reset the protection level to Low.
To remain protected in case the attack recurs, you might wait a few hours before
you reset the protection level.
Generally, you should set the protection level to low, which offers the least protection but
reduces the risk of blocking clean traffic. Reserve the medium and high levels for
mitigating attacks. See “Balancing protection and risk” on page 88.
For example, when an attack targets the servers that are protected by several protection
groups, you can raise the protection level for all of those protection groups.
Caution
If you make local changes on an APS device that is managed by APS Console, those
changes are not copied to APS Console. As a result, any changes that you make on an
APS are lost because the configurations from APS Console overwrite the configurations
on APS. Generally, you should not edit the configurations locally on a managed APS.
This process assumes that you are already aware of an attack on your network and that
APS is not blocking the attack. See “Indicators of Attacks and Mitigations” on page 248 for
information about how to recognize an attack.
If you do not want to spend time investigating, you can try to mitigate the attack by raising
the protection level or by some other method. For additional mitigation options, see
“About Attack Mitigation” on page 244 .
If you see any suspicious traffic, you can take steps to investigate further.
ATLAS Threat n Go to the Blocked Hosts Log page for a category and view the
Categories associated blocked hosts.
n Go to the Explore ATLAS Threat Categories page to examine the
threats that are blocked from your network as a result of the
ATLAS Intelligence Feed settings.
Look for traffic behavior that is unusual or unexpected. In particular, look for unexplained
traffic spikes, a sudden, significant increase in the traffic level or traffic rate, or traffic from
an unknown or unexpected source. Also, a URL or domain that has a very high percentage
of the total traffic is often an attack target.
When you identify a pattern in the attack traffic, you can create a payload regular
expression to block that type of traffic. See “Configuring Regular Expression Settings from
Captured Packets” in the APS User Guide .
Investigating and blocking an attack from the Blocked Hosts Log page
After you identify the host IP address that is responsible for the attack, view information
about that host on the Blocked Hosts Log page. From there, you can add the host to the
blacklist to prevent future attacks from that host.
If you determine that the host is no longer a threat, you can remove that host from the
blacklist.
If you determine that a legitimate host is blocked, you can whitelist that host.
APS provides reporting and packet capture features that enable you to gather forensic
information about traffic and attacks. In APS Console, you can view traffic information and
run packet captures for all of the instances of APS that are under management.
In this section
This section contains the following topics:
You can specify search criteria to limit the scope of the list and you can export the resulting
list. For information about searching and viewing the Blocked Hosts Log page, see “Viewing
the Blocked Hosts Log” on page 262 .
The Blocked Hosts Log page allows you to navigate to other areas of the UI, where you can
take action on specific /blocked hosts. See “Taking action on a blocked host” on
page 262.
Because the outbound blacklist in APS and certain protection categories can block
outbound traffic, the blocked hosts log can contain hosts whose outbound traffic was
blocked.
In APS, you can configure notifications that send messages when a host is blocked.
Forensic reporting
After an attack on a specific server, you can search the blocked hosts log for that server’s
destination IP address. The resulting list shows the hosts that were involved in the attack.
You can export the list to a file and include it in a report on the attack.
Debugging
When a customer reports that a legitimate host cannot access the server, you can search
the blocked hosts log for that source host. After you determine why the host was blocked,
you can edit your protection settings, whitelist that host, or relay the information to the
customer for corrective action.
Threat investigation
During or after an attack or another event, the traffic graphs and statistics might indicate
that certain traffic is blocked. The traffic may be blocked by an ATLAS threat category or by
the STIX IOCs in a TAXII collection. View the blocked hosts log to identify the specific threat
and the IP address (external or internal) from which the threat originated.
You can blacklist the IP address to block its traffic in the future. If the attack traffic
originated from within your network, you can notify your security operations center to the
possible threats that are in the network.
For general information about the Blocked Hosts Log page and how you can use it, see
“About the Blocked Hosts Log” on page 260 . For details about the information on the
Blocked Hosts Log page, see “Information on the Blocked Hosts Log Page” on page 266 .
From the Blocked Hosts Log page, you can navigate to other areas of the UI, where you can
take action on a specific blocked host. See “Taking action on a blocked host” below.
You can export the blocked hosts information to a file for forensic reporting, and then
decide which of those hosts to blacklist to prevent future attacks.
The following actions are available from the Blocked Hosts Log page:
In the Blocked Host Detail window, click one of the following buttons:
n Blacklist
n Whitelist
n Unblock
n Remove from Whitelist
The host’s current status determines which options are available. The direction of the
blocked traffic (inbound or outbound) determines whether the action affects the blacklist
or whitelist for inbound traffic or outbound traffic. If the host’s inbound traffic was
blocked, then these actions apply to all of the protection groups. (Outbound traffic is not
associated with the protection groups.)
Hover your mouse pointer over a source IP address, click (context menu), and then
select Packet Capture . When the Packet Capture page opens, the host’s IP address is
entered in the Filter section. You can start the packet capture or specify additional filter
criteria. See “Capturing Packet Information” on page 275.
On the Blocked Hosts Log page or in the Blocked Host Detail window, click the protection
group name link. See “Viewing the Traffic Activity for a Protection Group” on page 194.
APS sees only the request to the DNS server, not the resolution of the IP address for the
bad host. However, the DNS server appears as a blocked destination IP address on the
Blocked Hosts Log page.
When a host is blocked by an ATLAS threat policy that contains domain-related rules,
appears next to the destination IP address on the Blocked Hosts Log page. Click to
display an explanatory message.
If you think that the blocked traffic is legitimate, contact the Arbor Technical Assistance
Center (ATAC) at https://support.arbornetworks.com/. Your feedback helps us to
continually improve the AIF content.
Time selector Select one of the time increments or click From to change the
timeframe for which the data is displayed. Only the hosts that were
blocked within this timeframe appear in the search results. See
“Changing the display timeframe” on page 28.
Filter box To find the hosts that were blocked for specific devices or
protection groups, click the Filter box and then select a device
from the list. If you are searching for inbound blocked hosts, you
also can select from a list of protection groups. If you are searching
for outbound blocked hosts, then the Outbound Threat Filter
option appears instead of the protection groups. You can select
additional devices and protection groups in any combination.
Attack To find the hosts that were blocked by one or more specific attack
Categories check categories, select the appropriate check boxes. You can select
boxes individual categories or groups of categories:
n To search all of the AIF threat categories, select the ATLAS
Threat Categories check box.
n To search all of the TAXII collections, select the STIX Threats
check box.
n To search all of the categories in the list, select the Attack
Categories check box.
Note
Blacklisted Hosts is considered a category. This category
displays the blocked traffic for blacklisted hosts.
For information about viewing and using the blocked hosts log, see “Viewing the Blocked
Hosts Log” on page 262 .
For general information about the Blocked Hosts Log page and how you can use it, see
“About the Blocked Hosts Log” on page 260 .
The information about the hosts that are blocked by multiple instances of APS Console
can represent a large amount of data. For efficiency’s sake, when you open the Blocked
Hosts Log page, no data appears until you specify the search criteria. For more information
about searching on the Blocked Hosts Log page, see “Blocked hosts search criteria” on
page 264 .
When the search is complete, the resulting information remains on the Blocked Hosts Log
page for an hour, or until you perform another search or cancel a search. After an hour,
the system deletes the search results and resets the Blocked Hosts Log page to an empty
state.
Devices Displays the name of the APS that blocked the host and the
protection group for which the host is blocked.
If multiple APS devices blocked the host, or if multiple protection
groups are associated with the blocked host, this column displays
the number of devices or protection groups. You can view a list of
those devices and protection groups by hovering your mouse
pointer over the device name.
You can click the device name or protection group name to
navigate to the Blocked Hosts Log page in the APS that blocked the
host. The Blocked Hosts Log page displays the protection groups for
which the host is blocked.
Destination Lists the range of destination IP addresses that the blocked host
targeted. However, if outbound traffic was blocked because the
destination host is on the outbound blacklist, then this column
represents the blocked host. (A host that is on the outbound
blacklist is blocked when it is either the source or the destination of
traffic that originates from your network.)
When a host is blocked by an ATLAS threat policy that contains
domain-related rules, appears next to the destination IP address
on the Blocked Hosts Log page. The DNS server appears as the
blocked destination IP address. However, APS does not block all of
the traffic to the DNS server; it only blocks the DNS request for a
known bad host. See “About matching domain policies” on
page 54 and “Investigate why a DNS server appears to be
blocked” on page 263 .
Threats Displays any threats that were blocked by the ATLAS threat
categories. Click next to a threat to view a description of that
threat.
Last Activity Displays the amount of time since the last time that the host’s traffic
was blocked. If multiple devices blocked the host, you can view a list
of those devices by hovering your mouse pointer over the Last
Activity entry. You can click a device name to navigate to the Blocked
Hosts Log page in the APS that blocked the host. The Blocked Hosts
Log page is filtered for that particular host.
Total Traffic Displays the amount of the host’s traffic that was blocked during
the specified time period. The traffic is displayed in bytes and
packets.
Traffic Rate Displays the rate of the host’s traffic that was blocked during the
specified time period. The traffic rate is displayed in bits per second
or packets per second.
For general information about the threat categories, see “About the ATLAS Threat
Policies” on page 54.
Outbound Blocked (Outbound tab only) Displays the blocked outbound traffic for
Threats graphs all of the blocking threat categories on the following graphs:
n The stacked graph represents the average rate of the
outbound traffic that was blocked, in bytes per second or
packets per second.
n The line graph represents the number of source hosts that
were blocked per minute.
You can hover your mouse pointer over a section of either graph
until a popup window appears. The popup window displays the
threat category name, amount of blocked traffic or blocked
hosts, and time that are associated with the nearest data point
on the graph. The pointer on the popup window indicates the
data point.
Key Shows the color that represents the specific threat category in
the blocked threat graphs and allows you to filter the graph
displays.
You can click a threat category’s key to hide or show that
category on the graph, so that you can focus on the traffic for
specific categories.
Category Displays the name of the threat category that blocked the traffic.
You can click the threat category’s name link to open the Threat
Category Details page for that category. See “Information on the
Threat Category Details page” on page 272.
Source Hosts (Outbound tab only) Shows the aggregate sum of the hosts that
Blocked the threat category blocked for each minute of the display
timeframe. For example, if the timeframe is 1 hour, then this
column represents the sum of the hosts that were blocked for
each of the last 60 minutes.
Source Hosts (Outbound tab only) Shows the average number of source
Blocked Rate hosts per minute (pm) that the threat category blocked.
Total Bytes Blocked, Shows the amount of traffic and the average rate of traffic that
Bytes Blocked Rate the threat category blocked.
or Total Packets The traffic is displayed in bytes or packets, depending on the unit
Blocked, Packets of measure that is selected for this page.
Blocked Rate
Outbound Blocked (Outbound tab only) Displays the blocked outbound traffic for
Threats graphs the top 10 threats on the following graphs:
n The stacked graph represents the average rate of outbound
traffic that was blocked, in bytes per second or packets per
second.
n The line graph represents the number of source hosts that
were blocked per minute.
You can hover your mouse pointer over a section of either graph
until a popup window appears. The popup window displays the
threat name, amount of blocked traffic or blocked hosts, and
time that are associated with the nearest data point on the
graph. The pointer on the popup window indicates the data
point.
Key Shows the color that represents the specific threat in the blocked
threat graphs and allows you to filter the graph displays.
You can click a threat’s key to hide or show that threat on the
graphs, so that you can focus on the traffic for specific threats.
Threat Displays the name of the threat that the selected category
blocked.
(context menu) Appears when you hover your mouse pointer over a threat. Click
, and then select one of the following options:
n Blocked Hosts — Displays the Blocked Hosts Log page with
the search criteria selected. You can start the search or specify
additional search criteria. See “Viewing the Blocked Hosts
Log” on page 262.
n (Learn more ) — Displays a description of the threat.
Severity Indicates the severity level that ASERT assigned to this threat.
Source Hosts (Outbound tab only) Shows the average number of source
Blocked Rate hosts per minute (pm) that were blocked for this threat.
Total Bytes Blocked, Shows the amount of traffic and the average rate of traffic that
Bytes Blocked Rate was blocked for this threat.
or Total Packets The traffic is displayed in bytes or packets, depending on the unit
Blocked, Packets of measure that is selected for this page.
Blocked Rate
The packet capture provides a sample of the traffic data. It is not intended to capture
complete information about any given stream or application session.
Forensic reporting During an attack on a specific service, you capture a sample of the
packets that contain headers for that service. After inspecting the
packets, you save the packet information to a packet capture
(PCAP) file. You can use the PCAP file in a packet analysis program,
save it for reporting purposes, or send it to Arbor for technical
assistance.
Investigate false Clean traffic is blocked and you need to determine the cause so
positives that you can change your protection settings or whitelist the host.
You can investigate false positives by capturing the packet or
packets that caused a specific host’s traffic to be blocked.
Important
If multiple users on APS capture packets simultaneously, APS returns different packets
for each user. No two users receive the same packet.
You also can perform the following tasks on the Packet Capture page:
n Inspect the packet information. See “Information on the Packet Capture Page” in the
APS User Guide .
n Save the packet information to a packet capture (PCAP) file.
n Blacklist a packet’s source address, target domain, or target URL.
n Use the information from a captured packet to update the settings in the Payload
Regular Expression protection category. See “Configuring Regular Expression Settings
from Captured Packets” in the APS User Guide .
2. On the Packet Capture page, in the Filter section, specify the criteria for filtering the
packet capture. See “Packet filter criteria” in the APS User Guide .
If you do not want to filter the packets, do not specify any filter criteria.
3. In the Capture section, click Start.
Note
If you specify filter criteria but do not click (add), that filter criteria is added for you
when you click Start .
4. To limit the display of the capture results, either during the capture or after the
capture, click Passed, Dropped, or All.
APS always captures all of the packets that match the criteria in the Filter section,
regardless of how you choose to display them.
5. When you want to stop the packet capture, click Pause.
If you do not stop the packet capture, it will stop automatically at 5,000 packets.
6. To view detailed information about a packet, click the packet, and then scroll down to
the Packet Details section.
7. (Optional) As you inspect the packet details, you can take action to block future traffic
from the source of the packet, as follows:
l To blacklist the source address, domain, or URL, click the associated Blacklist
button.
Note
The item is blacklisted for all IPv4 protection groups or all IPv6 protection groups.
l To add packet information to the Payload Regular Expression protection category,
click the Add to Payload Regex button. See “Configuring Regular Expression
Settings from Captured Packets” in the APS User Guide .
This section provides information about how to configure and manage centralized reports
on the APS Console. A centralized report aggregates the data for multiple APS devices that
the APS Console manages.
In this section
This section contains the following topics:
The report provides information about the attacks that one or more APS devices detected
and blocked on your network over time. The report also provides information about high-
level traffic trends on your network over time.
For details about how to configure a centralized report, see “Configuring On-Demand
Centralized Reports” on page 283 .
For more details about the information included in a centralized report, see “About the
Centralized Executive Summary Report” on the facing page.
You configure these reports on the Reports page. See “Configuring On-Demand
Centralized Reports” on page 283.
Important
Some of the data in the Executive Summary report is based on the traffic for the selected
protection groups. However, the data for the top hosts is based on all of the traffic for all
of the selected APS devices.
APS Console The hostname of the APS Console on which the report is run,
name which appears below the report name.
Date range The user-selected date range for the data in the report, which
appears below the logo.
Cloud Signaling
Important
Some of the data in the Executive Summary report is based on the traffic for the selected
protection groups. However, the data for Cloud Signaling is based on all of the traffic for
all of the selected APS devices.
If cloud-based mitigation occurred during the specified date range, the report includes
Cloud Signaling data. Events Mitigated shows the number of unique DDoS attacks that
were mitigated. Targeted IPs Protected shows the number of hosts in your network that
the selected APS devices protected from DDoS attacks by using cloud-based mitigation.
See “About Cloud Signaling for DDoS Protection” in the APS User Guide .
DDoS Protection
If data about the inbound traffic is available, the report includes the following information
for the selected protection groups:
n The amount of blocked inbound traffic, in bytes
n The percentage of inbound traffic that was blocked versus the total amount of inbound
traffic
n The number of unique hosts that were blocked
Note
If the number of blocked hosts exceeds 100,000, the report displays 100000+ as the
blocked hosts statistic.
n A stacked graph that displays the amount of blocked inbound traffic versus the amount
of passed inbound traffic
n The average daily amount, in bytes, of the total inbound traffic, blocked inbound traffic,
and passed inbound traffic during the specified date range
To calculate the average daily inbound traffic, the total amount of outbound traffic for
the selected APS devices is divided by the number of days in the specified date range.
n The average rate, in bps, for the total inbound traffic, the blocked inbound traffic, and
the passed inbound traffic during the specified date range
If data about the outbound traffic is available, the report includes the following
information for the selected protection groups:
n The amount of blocked outbound traffic, in bytes
n The percentage of outbound traffic that was blocked versus the total amount of
outbound traffic
n The number of unique hosts that were blocked
n A stacked graph that displays the amount of blocked outbound traffic versus the
amount of passed outbound traffic
n The average daily amount, in bytes, of the total outbound traffic, blocked total traffic,
and passed outbound traffic during the specified date range
To calculate the average daily outbound traffic, the total amount of outbound traffic for
the selected APS devices is divided by the number of days in the specified date range.
n The average rate, in bps, for the total outbound traffic, blocked outbound traffic, and
passed outbound traffic during the specified date range
If no outbound traffic is available during the specified date range, the report omits the
outbound traffic section.
Note
In APS, country mappings do not exist for IPv6 addresses. As a result, the report
displays an IPv6 flag instead of a country flag when the source is an IPv6 address.
n A stacked graph that represents each country’s total passed traffic in green and its total
blocked traffic in red
n The amount of traffic from each country that was passed and blocked, in bps and pps
n The percentage of the total traffic that each country’s traffic represents, shown as a
number and as a proportion bar. The bar for the top country is the full column width
and the remaining bars are in proportion to it.
In this case, total traffic refers to the total traffic for the countries that are included in this
report.
n A stacked graph that represents the amount of outbound traffic that was blocked
n A key for each graph that shows the color that represents a specific threat category in
the graph
n The name of the threat category that blocked the traffic
n The amount of inbound traffic and the amount of outbound traffic that was blocked
If the data is available, the report includes the following information about the five external
IP addresses that sent the most traffic:
n The IP address for the source host. If APS can identify the host’s country, this column
also includes a flag icon that represents the country.
Note
In APS, country mappings do not exist for IPv6 addresses. As a result, the report
displays an IPv6 flag instead of a country flag when the source is an IPv6 address.
n A graph that represents the total traffic from the source
n The total amount of traffic from the source, in bytes and packets
n The average rate of traffic from the source, in bps and pps
If the data is available, the report includes information about the five internal IP addresses
groups that received the most traffic:
n The IP address to which the traffic is destined
APS Devices
This section lists the APS devices whose data is included in the report. You select the APS
devices when you configure the report. See “Configuring On-Demand Centralized
Reports” on the facing page.
Protection Groups
This section lists the protection groups whose data is included in the report. You select the
protection groups when you configure the report. See “Configuring On-Demand
Centralized Reports” on the facing page.
Note
The time zone that appears on the report results is the time zone for the APS Console.
For an overview of centralized reports, see “About Centralized Reports” on page 278 . For
a description of the information that the APS Console includes in the report, see “About
the Centralized Executive Summary Report” on page 279 .
7. On the Step 3 page, all of the protection groups are selected by default. The list
includes all of the protection groups to which the selected APS devices are assigned. If
you do not want to include all of the protection groups in the report, complete one of
the following steps:
l To deselect all of the protection groups, select the check box next to the Protection
Groups column header. Then select the check box next to each protection group to
include.
l To exclude a protection group, clear the check box next to the protection group
name.
You must select at least one protection group before you can continue to the next
step.
Tip
To filter a large list of protection groups, enter the name of a protection group or a
server type in the Search box. You can enter the full name or the partial name of
one or more protection groups or server types.
8. Click Next.
9. On the Step 4 page, in the Reporting on section, review the settings that you selected
on the previous pages. To change any of these settings, click Previous to return to the
appropriate page.
10. In the Name box, type a name for the report. The name may contain up to 56
characters.
11. (Optional) In the Description box, type a description for the report. The description
may contain up to 132 characters.
12. (Optional) In the Audit Trail Change Message box, type a message that describes
the change. This message will appear in the audit trail. See “Viewing the Audit Trail
Log” on page 319.
13. (Optional) To deliver the report results as a PDF file to specific destinations, type one
or more email addresses in the Email Addresses box. Enter multiple emails as a
comma-separated list.
Important
To send emails from APS Console, you must configure an SMTP server on the
Configure General Settings page (Administration > General). See “Configuring
General Settings” on page 32.
14. Click Submit.
After you submit the report, the report is added to the list on the Centralized Reports page.
The location of the report in the list is based on the selected sort order. However, if you
sort the reports by Run Date (ascending or descending), any requested reports or running
reports appear at the top of the list. After APS Console generates the report, the report is
added to the list in the selected Run Date order.
For information about sort order, see “Sorting the list of reports” on page 288 . For
information about how to view the report results, see “Viewing the results for a
centralized report” on page 286 .
You also can delete centralized reports on this page. See “Deleting centralized reports” on
page 288.
For instructions on how to configure centralized reports, see “Configuring On-Demand
Centralized Reports” on page 283 .
For a description of the information that the APS Console includes in these reports, see
“About the Centralized Executive Summary Report” on page 279 .
Selection check Allow you to select one or more of the reports to delete.
boxes You cannot delete reports with a status of Requested or Running.
(context menu) Appears in the Name column. Click the icon and select Export as
PDF to generate a PDF file of the report.
Run Date column Indicates the date and time on which the APS Console generated
the report. The run date is based on the time zone for the APS
Console.
Report Status Indicates the state of the report. The possible states are as follows:
column n Requested — Appears after the report has been configured,
but before APS Console starts generating the report
n Running — Appears while APS Console is generating the report
n Completed — Appears after the report is complete, and you
can view the results
n Failed — Appears if the APS Console cannot complete the
report. If the report fails, click (error) to view the reason for
the failure.
Date Range Indicates the start date and the end date for the data in the report.
column
Requested by Indicates the name of the person who configured the report.
column
Note
If you enter the name of a report or the name of a requester that is not in the list, the
APS Console hides all of the reports.
3. To clear the filtered list and view all of the reports, click (clear).
To change the sort order of the reports on the Centralized Reports page:
1. Select the Reports menu.
2. On the Centralized Reports page, change the order of the reports in one of the
following ways:
l To change the direction of the sort in the currently selected column, click
(ascending) or (descending) to the right of the column name.
l To change the column to sort the reports by, click (ascending) or
(descending) to the right of different column name.
This section describes how to use the Dashboard page to view the security status of your
network.
In this section
This section contains the following topics:
The Dashboard page appears by default when you log in to APS Console.
Note
The filters for the timeframe and the unit of measure do not affect the Active Alerts
section.
If no APS devices are under APS Console management, then a “No Data” message
appears.
For general information about the Dashboard page, see “Viewing a Dashboard of
Network Activity” on page 292 .
APS devices reporting Displays the number of APS devices that are reporting traffic
message compared to the total number of APS devices that are under
management. This information can indicate any
communication errors that might affect the data in the graph.
information to examine the threats that are blocked from your network as a result of the
ATLAS Intelligence Feed settings.
This section contains two graphs and their accompanying data tables; one for inbound
traffic and one for outbound traffic.
Outbound Blocked For outbound traffic, represents the number of source hosts that
Threats graph were blocked per minute for the top five threat categories.
You can hover your mouse pointer over a section of the graph
until a popup window appears. The popup window displays the
threat category name, number of blocked hosts, and time that are
associated with the nearest data point on the graph. The pointer
on the popup window indicates the data point.
Key Shows the color that represents the specific threat category in the
blocked threat graphs and allows you to filter the graph displays.
You can click a category’s key to hide or show that threat category
on the graphs, so that you can focus on the traffic for specific
categories.
Category Displays the category’s name as a link that allows you to open the
Threat Category Details page for the category. See “Information
on the Threat Category Details page” on page 272.
(context menu) Appears when you hover your mouse pointer over a threat
category. Click , and then select one of the following options:
n Blocked Hosts — Displays the Blocked Hosts Log page with the
search criteria selected. You can start the search or specify
additional search criteria. See “Viewing the Blocked Hosts Log”
on page 262.
n (Learn more ) — Displays a description of the threat category.
Bytes Blocked or (Inbound only) Shows the amount of inbound traffic that the
Packets Blocked threat category blocked.
The traffic is displayed in bytes or packets, depending on the unit
of measure that is selected for this page.
Explore ATLAS Displays the Explore ATLAS Threat Categories page, on which you
Threat can view the threat categories that are blocking traffic on all of the
Categories link managed APS devices. See “Viewing the ATLAS Threat Categories
that Block Traffic” on page 269.
For general information about the Dashboard page, see “Viewing a Dashboard of
Network Activity” on page 292 .
For general information about alerts, see “About Alerts” on page 302 .
Alert description Displays a description of the alert and the hostname of the
appliance or other device that generated the alert.
You can click an alert to open a window that contains additional
information about that alert, including the appliance, severity, date,
duration, and category. The window can contain links to other
pages, where you can explore specific aspects of the alert. The type
of alert that you select determines the information and links that
appear. See “Links to additional alert information” on the next
page.
You can hover your mouse pointer over the severity box to view
the numerical severity value.
See “About alert severity levels” on page 302.
View All Alerts Displays the Alerts page, where you can view all of the alerts that
link were generated by APS Console and the managed APS devices.
See “Viewing a Summary of Alerts” on page 304.
Note
Some of the links in the information window open APS. If your APS user account has the
same username as your APS Console user account, the APS opens without prompting
you to log in.
Protection Group APS alerts that Opens the View Protection Group page in the
are associated APS that generated the alert, where you can
with a protection view detailed information in real time about the
group protection group’s traffic.
See “Viewing the Traffic Activity for a
Protection Group” on page 194.
Ignore button All alerts Allows you to prevent a specific alert from
appearing on the Dashboard page.
When you ignore an alert, it is removed from the Dashboard page, but it is not removed
from the system. The alert still appears on the Alerts page, where its status is marked as
Active (Ignored). The alert remains ignored until it expires. If the associated event recurs
after the initial alert expires, a new alert is created.
You can remove an alert from the Dashboard page in the following ways:
n On the Dashboard page:
This section describes how to view all of the alerts in APS Console and any managed APS
devices to determine which alerts are the most critical.
In this section
This section contains the following topics:
About Alerts
Alerts are indicators of certain system events and security events that occur in APS Console
or in managed APS devices. To organize and provide additional information about the
alerts, APS Console groups the alerts into categories. For example, you can filter the
display of the Alerts page by category, and the Dashboard page displays security alerts by
category.
Alert categories
Category and type Example
DDoS (security) The traffic on an APS device exceeds a configured threshold. You
can set thresholds for blocked traffic, botnet traffic, and total
traffic.
Internal Resource Issues with a resource that is internal to the device. For example:
(system) An interface is down, disk space is low, or a power supply fails.
Infrastructure Issues with a resource that is external to the device. For example:
(system) A GRE tunnel is down, Cloud Signaling fails, or a backup fails.
License (system) The APS Console license is about to expire or the traffic on an
APS device exceeds a certain percentage of its licensed
throughput limit.
You can use the severity level to search for alerts and to filter the display on the Alerts page.
The alert severity levels are expressed as either numbers or icons. Typically, when the
icons are displayed, you can hover your mouse over an icon to view the numerical value.
The default severity level for all types of alerts is predefined. You can change the default
severity level for system event alerts. See “Configuring System Alerts” on page 42.
Alerts page Provides a single view of all the security alerts and system alerts
(Explore > Alerts) that are generated by APS Console and any APS devices that it
manages. See “Viewing a Summary of Alerts” on the next page.
System alerts and APS alerts expire automatically when the behavior that triggered the
alert stops. For example, a device that was down is restarted, or the APS traffic drops
below a configured threshold.
You can prevent a specific alert from appearing on the Dashboard page by setting it to be
ignored. The options to ignore alerts appear on both the Dashboard page and the Alerts
page. Ignoring an alert does not delete it from the system. See “Removing alerts from the
Dashboard page” on page 299.
n From the Dashboard page — Click the View All Alerts link in the Active Alerts section.
If a protection group has any active alerts, you also can access the Alerts page from the
Protection Group page and the View Protection Group page. See “Viewing the Status of
Protection Groups” on page 225 and “Viewing the Traffic Activity for a Protection
Group” on page 194 .
For each alert, the Alerts page displays the following information. By default, the alerts are
sorted by start time in descending order (the most recent alerts first). You can sort by any
of the columns on the Alerts page.
Alert details
Information Description
Selection check Allows you to select the alert to be ignored. See “Removing alerts
box from the Dashboard page” on page 299.
The check box does not appear for the alerts that cannot be
ignored.
Appliance Displays the hostname of the appliance that generated the alert.
Time Indicates when the alert began and displays the alert’s duration.
(context menu) Appears when you hover your mouse pointer over an active alert’s
name. The options that appear on the context menu allow you to
view additional information about the alert. The options that are
available depend on the type of alert.
The context menu is available for certain types of active alerts only.
Note
APS alerts appear on the Alerts page even if the associated protection group is inactive.
Options to ignore alerts appear on the Dashboard page and the Alerts page. See
“Removing alerts from the Dashboard page” on page 299.
Note
To sort the alerts by a specific column, click the column’s heading.
For certain types of active alerts, the context menu also provides links to other pages,
some of which may be on an APS. The type of alert that you select determines the options
that appear on the context menu.
Filtering alerts
To filter alerts:
n On the Alerts page, specify one or more criteria to filter the alerts display. See Filter
criteria for alerts.
Note
The Alerts page is already filtered when you access the page from the List Protection
Groups page or the View Protection Group page.
Start box, End Define the timeframe for which to display the alerts, based on when
box the alerts were active. In the calendar that appears, select the date
and time or click Now to select the current date and time. Click
Done to close the calendar window.
To view all of the alerts, select all of the security level options, which
is the default setting.
See “About alert severity levels” on page 302.
For example, if you enter category1, category2, appliance5, and appliance6, the system
filters the display as follows:
Tip
You can use custom terms to filter different items with ORs. For example, to display the
alerts that belong to either category1 or appliance5, type each item as a separate custom
term.
n To ignore all of the active alerts on the current page, select the check box in the table
heading row, and then click Ignore Alerts.
You also can ignore alerts from the Dashboard page. See “Viewing Active Alerts on the
Dashboard” on page 297.
If necessary, you can unignore an ignored alert, which allows it to reappear on the
Dashboard page if it is among the most critical alerts.
To unignore an alert:
1. On the Alerts page, click (context menu) for the alert.
2. Select Unignore.
The Summary page provides an overview of the current state of your APS Console
deployment, including the historical traffic across your configured devices.
User access
System analysts and system users can search and view the summary information, but they
cannot access all the pages that are described in this section. Only administrators can
access all the pages and perform all the tasks that are available from the Summary page.
In this section
This section contains the following topics:
For more details, see “Viewing System Information on the Summary Page” on the facing
page.
System Status Displays the statistics for your APS Console. This section also lists
the total number of devices that are under APS Console
management.
System Displays detailed information about your APS Console and the
Information devices that are under APS Console management.
Audit Trail Displays the most recent Audit Trail entries. See “Viewing Audit
Trail Information on the Summary Page” on page 313.
If you hover your mouse over the icon, it displays a message that indicates whether
clicking the icon will turn on or turn off the auto-refresh option.
If a device experiences connectivity problems, then APS Console displays that device’s
status at the top of the Summary page to alert you immediately.
For general information about the Summary page, see “Viewing a Summary of System
Activity” on the previous page.
Information Description
Last AIF Update Indicates the last time that APS Console polled the AIF server for
Check new information. You can update the AIF interval time and poll
the server on the Configure AIF Settings page.
If you do not enable automatic AIF updates, this area displays
Autoupdate Disabled instead of Last AIF Update Check .
See “Configuring the ATLAS Intelligence Feed” on page 60.
Last Backup Indicates the time at which the system backed up APS Console
data. The APS Console data is backed up automatically every 24
hours. You can download a copy of the last backup file or upload
an older saved version.
For a description and instructions, see “Configuring Remote
Backup Settings” on page 44.
Total Devices Displays the number of APS devices and AED devices under APS
Console management.
Device Type Indicates whether the device is an APS Console, an APS, or an AED.
Uptime Displays the time that has elapsed since the device was last
restarted, in days, hours, and minutes.
If the device is down, “Offline” appears in this column. If the device
remains down, then you can delete it. See “Deleting Offline
Devices” on page 89.
Last Seen Indicates the last time that the device reported to APS Console.
Status Describes the overall status of a device. The status can be one of
the following messages:
n High memory usage: <usage percentage>
n High disk usage: <amount of MB remaining>
n Communication error, last heartbeat received: <time last
received>
n Synchronize times: skew is <amount of time>
n Device is down: last seen <time last seen>
n Multiple Problems: <the list of problems>
n Good
n RAID error: <error message>
n Preparing configuration
n Initial synchronization
n Out of sync
n Unsupported device version. The configurations cannot be
synchronized.
Version Displays the current software version that the appliance is running.
For more information about the Audit Trail, see “Information in the audit trail” on
page 319 and “ Including Change Messages in the Audit Trail” on page 318 .
For general information about the Summary page, see “Viewing a Summary of System
Activity” on page 310 .
This section describes how to use the audit trail, which records all of the changes that are
made in APS Console.
User access
Users at all authorization levels can include change messages in the audit trail. Only
administrators can view the audit trail and configure the audit trail settings.
In this section
This section contains the following topics:
Command help These commands are not included in the audit trail.
By default, when you make a change, the Audit Trail window appears and prompts you to
enter a change message. The best practice is to add a message that provides some insight
into what you did and why you made the change. However, you also have the following
options:
n Do not enter a change message.
n Enter a default message for all of the future changes that you make.
n Disable the Audit Trail window for all of the future changes of that type that you make.
Settings on the Audit Trail page determine the default change message (if any) and the
kinds of changes that trigger the appearance of the Audit Trail window. See “Configuring
the Audit Trail Settings” on page 41.
Administrators can view the audit trail log in the Audit Trail page (Administration >
Audit Trail). See “Viewing the Audit Trail Log” on the facing page.
For general information about the audit trail, see “About the Audit Trail” on page 316 .
For information about recording changes to APS Console, see “ Including Change
Messages in the Audit Trail” on the previous page.
For information about editing the default settings for audit trail changes, see “Configuring
the Audit Trail Settings” on page 41.
Action Indicates the type of change, such as Add, Edit, Delete , Update , and
so on.
Message Displays the text from the change message that a user typed, or a
system message for system-generated entries.
Note
You also can view the entries in the audit trail on the Summary page. See “Viewing Audit
Trail Information on the Summary Page” on page 313 .
This section describes how to use the Manage Files page (Administration > Files) to
manage the files that are on APS Console. You can also manage files that are on the APS
devices that APS Console manages.
User access
Only administrators can perform the tasks that are described in this section. System users
cannot view the Files page.
In this section
This section contains the following topics:
The Files page is divided into sections that allow you to perform the following file
management tasks:
n Upload, download, and delete the files on APS Console and managed APS devices.
See “Managing the Files on APS Console and Managed APS Devices” on page 326.
n A disk space pie chart that displays the amount of used disk space and free disk space
on the selected device.
n A table that includes detailed information about the files on the selected device.
The tables displays the following information for each file that is on the selected device:
Date The time and date when the file was uploaded.
Type The type of file. A file can be one of the following types:
n Text file
n Directory
n Gzip compressed
n Signed package
n SSH host keys
n Unknown
Status Indicates whether the file has been installed on the selected
device. This status applies to installation packages only.
The table in the Diagnostics Packages section contains the following information for each
package:
When you manage files on the Manage Files page, the changes apply only to the device
that is selected in the Show files on list.
You can create new diagnostics packages and download, email, and delete the packages.
For general information about the Files page, see “About the Files Page” on page 324 .
The package creation might take several minutes. A message at the top of the page
indicates that the package creation is in progress.
Tip
If the diagnostics package does not appear within a few minutes, click (Refresh This
Page) on the Arbor Smart Bar.
Setting Description
From box Type your email address.
Message box Type a message that explains how you want Arbor to
process the diagnostics package.
4. Click Email.
User access
Users at all authorization levels can view the backup configurations. Only administrators
can perform the backup tasks that are described in this section.
In this section
This section contains the following topics:
How they are APS Console runs remote backups automatically, based on a user-
created defined schedule. You also can run a remote backup manually at
any time.
See “Configuring Remote Backup Settings” on page 44.
Typical use To restore a known configuration state. For example, you might
want to restore APS Console to a known configuration state after
you perform benchmark tests or try new configurations.
How they are APS Console runs local backups automatically, every night at
created midnight. You also can run a local backup manually at any time. See
“Running a Local Backup Manually” on page 332.
See “Restoring APS Console from a Backup” in the APS Console Advanced Configuration
Guide .
n To save a known configuration state before you perform benchmark tests or try new
configurations. When you finish your tests, use the backup to restore APS Console to
the last known configuration.
n To save any configuration changes immediately instead of waiting for the next
scheduled backup.
For general information about backups, see “About APS Console Backups” on page 330 .
For information on configuring remote backups, see See “Configuring Remote Backup
Settings” on page 44.
Backup details
Information Description
Date The date and time on which the backup was created.
This section provides examples of the notifications that APS Console sends to the
configured destinations when it detects system alerts.
In this section
This section contains the following topics:
APS up alert
The following example shows an APS up alert:
APS Up: system.arbor.net
Type: APS Up
URL: https://aps.example.com/summary/
APS: system.APS Console.net
Down since: 20:02 09/03/16
Downtime: 0h05m
Infrastructure alert
The following example shows an infrastructure alert:
Infrastructure: Your cert will expire in 1 day
Type: Infrastructure
URL: https://aps.example.com/summary/
Message: Your cert will expire in 1 day
APS up alert
The following example shows an APS up alert:
APS Up: system.arbor.net,URL: https://aps.example.com/summary/,Last
seen: 20:18 09/03/16,Downtime: 0h05m
Infrastructure alert
The following example shows an infrastructure alert:
Infrastructure: Your cert will expire in 1 day,URL:
https://aps.example.com/summary/
This section describes the FCAP (Flow Capture) fingerprint expression language that you
can use to match layer 3 traffic information. This expression language is an extended
version of the standard fingerprint expression language that is used by programs such as
tcpdump.
In this section
This section contains the following topics:
[ ] (square brackets) A set of choices for options or variables, any of which is optional.
For example: [variable1 | variable2].
n the operators AND, OR, NOT, and () — See “Logical Operators for Compound FCAP
Expressions” on page 349.
n expressions that indicate direction — See “FCAP Expressions that Indicate Direction”
on page 350.
n examples — See “Examples of FCAP Expressions” on page 351.
Note
Unless otherwise noted, FCAP expressions are supported for IPv4 traffic and IPv6 traffic.
Any line that begins with # is considered a comment and is not evaluated as part of the
FCAP expression.
The action expression is optional. If you do not specify one, APS uses a drop action.
To match a network or host, specify its IP address. You can use CIDR notation
(IP/number) to specify a network. For example:
net 192.0.2.0/24
host 192.0.2.1
If you specify an address without a netmask or without the expression net or host, the
address is assumed to be a host.
If you do not specify a direction, then both the source and the destination are evaluated.
See “FCAP Expressions that Indicate Direction” on page 350.
Matching protocols
Use the following expressions to match a protocol:
To match a protocol, specify its name or number. If you specify the protocol by name, you
can omit the expression protocol. For example:
protocol tcp
tcp
proto 6
For the flag fields, you can specify any combination of the following TCP flags:
n F — FIN
n S — SYN
n R — RST (reset)
n P — PSH (push)
n A — ACK
n U — URG (urgent)
n E — ECE (ECN-Echo)
n W — CWR (Congestion Window Reduced)
Do not separate multiple flags with any characters, including spaces or commas.
all of the TCP SYN traffic that is not SYN- Either of the following expressions:
ACK proto tcp and (tflags S/SA)
proto tcp and (tflags S/S) and !
(tflags SA/SA)
all of the traffic for which the A bit is set, tflags A/FA
but the F bit is not set
Matching ports
Use the following expression to match ports:
To match a range of port numbers, separate the first number and the last number with
two periods. For example:
port 0..1024
If you do not specify the source or the destination, then both the source and the
destination are evaluated. See “FCAP Expressions that Indicate Direction” on page 350.
any traffic with a destination IP address of dst host 192.0.2.1 and (dst
192.0.2.1 and a destination port of either 22 or 80 port 22 or dst port http)
Matching IP length
Use the following expression to match a packet’s IP length: bytes number [..number]
To match a range of bytes, separate the first number and the last number with two
periods. For example: bytes 100..102
For example, to match ICMPv4 echo request traffic by type, you can use either of the
following expressions:
icmptype icmp-echo
icmptype 8
Note
APS supports both ICMPv4 and ICMPv6 message types. However, for ICMPv6, you can
specify message type numbers only. You cannot use message type names for ICMPv6.
The ICMP code is a subtype of a given type. For example, the following expressions match
the ICMP control message type “Destination Unreachable”, and the subtype of “Host
Unreachable” (ICMPv4) or “address unreachable” (ICMPv6):
n ICMPv4
5 icmp-redirect Redirect
13 icmp-tstamp Timestamp
For a complete list of the ICMPv4 message types and codes, refer to an IPv4 reference or
go to the following URL: http://www.iana.org/assignments/icmp-parameters/icmp-
parameters.xhtml
For a complete list of the ICMPv6 message types and codes, refer to an IPv6 reference or
go to the following URL: http://www.iana.org/assignments/icmpv6-parameters/icmpv6-
parameters.xhtml
Specify the eight-bit TOS field as a number from 0 to 255. For example:
tos 255
tos 0XFF
Use the following expression to match the Time to Live (TTL ) value:
ttlnumber
Specify the eight-bit TTL field as a number from 0 to 255. For example:
ttl 6
Matching fragments
This expression is for IPv4 traffic only.
For more information about using FCAP expressions, see the following topics:
n “FCAP Expression Reference” on page 344
n “FCAP Expressions that Indicate Direction” on the next page
n “Available FCAP Expressions” on page 342
n “Examples of FCAP Expressions” on page 351
Omitting the operators and parentheses can produce unexpected results. For example, to
block all TCP traffic on port 80 or port 443, you might type the following expression:
tcp port 80 or tcp port 443
However, this expression does not do what you intend because the order of operations
interprets it as follows:
tcp and (port 80 or tcp) and (port 443)
In an FCAP expression, the direction refers to the source or destination section of the
packets that are evaluated.
For information about how to use FCAP expressions, see “FCAP Expression Reference” on
page 344 .
Indicating direction
The following expressions indicate direction:
src — source
dst — destination
For example:
src host 192.0.2.1
dst port 33
Default direction
If you do not specify a direction, then both the source and the destination are evaluated.
For example, the following expressions are equivalent:
host 192.0.2.1
(src host 192.0.2.1) or (dst host 192.0.2.1)
In particular, observe how APS interprets expressions when you omit certain components.
For example, you can omit the direction and the drop or pass action. You can also omit
the logical operators, although doing so can produce unexpected results.
For more information about FCAP expressions, see “FCAP Expression Reference” on
page 344 .
Examples
The following examples show how APS interprets FCAP expressions and how it makes
assumptions about any information that is omitted from the typed expressions.
Note
APS interprets FCAP expressions that use IPv6 addresses in the same way that it
interprets FCAP expressions that use IPv4 addresses.
not port 33 drop (src port 0..32 or src port 34..65535) and
(dst port 0..32 or dst port 34..65535)
dst host 192.0.2.1 drop dst host 192.0.2.1 and (src port 22 or dst
and port 22 port 22)
src 192.0.2.1 dst drop src host 192.0.2.1 and dst host
203.0.113.1 203.0.113.1
A
AAA (Authentication, Authorization, & Accounting) — An acronym that describes the process of
authorizing access to a system, authenticating the identity of users, and logging their behaviors.
ACL (Access Control List) — A list composed of rules and filters stored in a router to allow, deny, or
otherwise regulate network traffic based on network parameters such as IP addresses, protocol
types, and port numbers.
active mode — A state within the inline deployment modes, in which APS mitigates attacks in addition to
monitoring traffic and detecting attacks.
AIF (ATLAS Intelligence Feed) — A service that downloads real-time threat information from our Active
Threat Level Analysis System (ATLAS). This information is used to detect and block emerging
botnet attacks and application-layer attacks.
alert — A message informing the user that certain events, conditions, or errors in the system have
occurred.
anomaly — An event or condition in the network that is identified as an abnormality when compared to a
predefined illegal traffic pattern.
API (Application Programming Interface) — A well-defined set of function calls providing high-level
controls for underlying services.
APS — A protection system that focuses on securing the internet data center edge from threats against
availability by analyzing and blocking malicious traffic.
APS Console — A single user interface that allows for the central management of multiple APS devices, to
more effectively monitor and respond to attacks across your network.
Arbor Cloud DDoS Protection — A cloud-based DDoS mitigation service that scrubs the high-
bandwidth, volumetric attacks that are too large to mitigate at the data center’s premises.
Arbor Smart bar — An area of the product's user interface that contains icons for performing certain
actions.
ARP (Address Resolution Protocol) — A protocol for mapping an IP address to a physical machine
address.
ASCII (American Standard Code for Information Interchange) — A coded representation for
standard alphabetic, numeric, and punctuation characters, also referred to as “plain text”.
ATLAS (Active Threat Level Analysis System) — A globally scoped threat analysis network that
analyzes data from darknets and the core backbone of the internet to provide information to
participating customers about malware, exploits, phishing, and botnets.
B
black hole routing — A technique to route traffic to null interfaces that can never forward the traffic.
blacklist — A list of hosts whose traffic is blocked without further inspection. To add a host to the blacklist.
block — To prevent traffic from passing to the network, or to prevent a host from sending traffic. In APS,
blocking occurs for a specific length of time, after which the traffic is allowed to pass again.
botnet — A set of compromised computers (bots) that respond to a controlling server to generate attack
traffic against a victim server.
C
CA (Certificate Authority) — A third party that issues digital certificates for use by other parties. CAs are
characteristic of many public key infrastructure (PKI) schemes.
CAR (Committed Access Rate) — A tool for managing bandwidth that provides the same control as ACL
with the additional property that traffic can be regulated based on bandwidth usage rates in bits
per second.
CDN (Content Delivery Network) — A collection of web servers that contain duplicated content and
are distributed across multiple locations to deliver content to users based on proximity.
cflowd — Developed to collect and analyze the information available from NetFlow. It allows the user to
store the information and enables several views of the data. It produces port matrices, AS matrices,
network matrices, and pure flow structures.
CIDR (Classless Inter-Domain Routing) — Method for classifying and grouping internet addresses.
CLI (command line interface) — A user interface that uses a command line, such as a terminal or
console (as opposed to a graphical user interface).
client — The component of client/server computing that uses a service offered by a server.
Cloud Signaling — Cloud Signaling is the process of requesting and receiving cloud-based mitigation of
volumetric attacks in real time from an upstream service provider.
Cloud Signaling widget — A graphical element in the UI that allows the user to monitor the status of the
Cloud Signaling connection and mitigations in real time. It also allows the user to enable, activate,
and deactivate Cloud Signaling.
Common Event Format (CEF) — An open log management standard, which Arbor APS can use to
format syslog notifications.
CSV (comma-separated values) file — A file that stores spreadsheet or database information in plain
text, with one record on each line, and each field within the record separated by a comma.
customer edge — The location at the customer premises of the router that connects to the provider edge
of one or more service provider networks.
customer edge router — A router within a customer's network that is connected to an ISP's customer
peering edge.
D
Dark IP — Regions of the IP address space that are reserved or known to be unused.
data center — A centralized facility that houses computer systems and associated components, such as
telecommunications and storage systems, and is used for processing or transmitting data.
deployment mode — Indicates how APS is installed in the network: inline bridged, inline routed (layer 3
traffic; vAPS only), or out-of-line through a span port or network tap (monitor).
DNS (Domain Name System) — A system that translates numeric IP addresses into meaningful,
human-consumable names and vice-versa.
DNS server — A server that uses the Domain Name System (DNS) to translate or resolve human-readable
domain names and hostnames into the machine-readable IP addresses.
DoS (Denial of Service) — An interruption of network availability typically caused by malicious sources.
E
edge — The outer perimeter of a network.
encryption — The process by which plain text is scrambled in such a way as to hide its content.
exploit — Tools intended to take advantage of security holes or inherent flaws in the design of network
applications, devices, or infrastructures.
F
fail closed — The hardware bypass mode in which APS disconnects the protection interfaces and does
not allow traffic to pass after a system failure occurs. The hardware bypass mode is set from the
CLI.
fail open — The hardware bypass mode in which APS allows unmonitored network traffic to bypass the
protection interfaces after a system failure occurs. The hardware bypass mode is set from CLI.
failover — A configuration of two devices so that if one device fails, the second device takes over the
duties of the first, ensuring continued service.
FCAP — A fingerprint expression language that describes and matches traffic information.
Fibre Channel — Gigabit-speed network technology primarily used for storage networking.
fidelity period — The maximum amount of time for which APS saves data in the connection database.
fingerprint — A pattern or profile of traffic that suggests or represents an attack. Also known as a
signature.
firewall — A security measure that monitors and controls the types of packets allowed in and out of a
network, based on a set of configured rules and filters.
FQDN (Fully Qualified Domain Name) — A complete domain name, including both the registered
domain name and any preceding node information.
FTP (File Transfer Protocol) — A TCP/IP protocol for transferring files across a network.
G
Gb — Gigabit.
GB — Gigabyte.
global protection level — Determines which protection settings are in use for an APS.
GMT (Greenwich Mean Time) — A world time standard that is deprecated and replaced by UTC.
GRE (Generic Routing Encapsulation) — A protocol that is used to transport packets from one
network through another network.
GRE tunnel — A logical interface whose endpoints are the tunnel source address and tunnel destination
address.
H
handshake — The process or action that establishes communication between two telecommunications
devices.
header — The data that appears at the beginning of a packet to provide information about the file or the
transmission.
heartbeat — A periodic signal generated by hardware or software to indicate that it is still running.
HTTP (HyperText Transfer Protocol) — A protocol used to transfer or convey information on the
World Wide Web. Its original purpose was to provide a way to publish and retrieve HTML pages.
HTTPS (HyperText Transfer Protocol over SSL) — The combination of a normal HTTP interaction
over an encrypted Secure Sockets Layer (SSL) or Transport Layer Security (TLS) transport
mechanism.
I
ICMP (Internet Control Message Protocol) — An IP protocol that delivers error and control messages
between TCP/IP enabled network devices, for example, ping packets.
IMAP (Internet Message Access Protocol) — An application layer internet protocol that allows a local
client to access email on a remote server. (Also known as Internet Mail Access Protocol, Interactive
Mail Access Protocol, and Interim Mail Access Protocol.)
inactive mode — A state within an inline deployment mode, in which APS analyzes traffic and detects
attacks without performing mitigations.
inline mode — A deployment mode in which APS acts as a physical connection between two end points.
All of the traffic that traverses the network flows through APS.
IP (Internet Protocol) — A connectionless network layer protocol used for packet delivery between
hosts and devices on a TCP/IP network.
IPS (Intrusion Prevention System) — A computer security device that exercises access control to
protect computers from exploitation.
ISP (Internet Service Provider) — A business or organization that provides to consumers access to the
internet and related services.
L
LAN (Local Area Network) — A typically small network that is confined to a small geographic space.
Log Event Extended Format (LEEF) — An event format that Arbor APS can use to format syslog
notifications.
K
Kbps — Kilobits per second.
M
MAC (Media Access Control) Address — A unique hardware number associated with a networking
device.
malformed — Refers to requests or packets that do not conform to the RFC standards for internet
protocol. Such requests or packets are often used in DoS attacks.
MIB (Management Information Base) — A database used by the SNMP protocol to manage devices
in a network. Your SNMP polling device uses this database to understand APS SNMP traps.
mitigation — The process of using recommendations to apply policies to the network to reduce the
effects of an attack.
monitor mode — A deployment mode in which APS is deployed out-of-line through a span port or
network tap. APS monitors traffic and detects attacks but does not mitigate the attacks.
MSSP (Managed Security Service Provider) — An internet service provider (ISP) that provides an
organization with network security management,
multicast — Protocols that address multiple IP addresses with a single packet (as opposed to unicast and
broadcast protocols).
N
NetFlow — A technology that Cisco Systems, Inc. developed to allow routers and other network devices to
periodically export information about current network conditions and traffic volumes.
netmask — A dotted quad notation number that routers use to determine which part of the address is
the network address and which part is the host address.
network tap — A hardware device that sends a copy of network traffic to another attached device for
passive monitoring.
NIC (Network Interface Card) — A hardware component that maintains a network interface
connection.
notification — An email message, SNMP trap, or syslog message that is sent to specified destinations to
communicate certain alerts.
NTP (Network Time Protocol) — A protocol that synchronizes clock times in a network of computers.
NXDomain — A response that results when DNS cannot resolve a domain name.
O
outbound threat filter — A group of protection settings that block malicious outbound traffic.
out-of-band — Communication signals that occur outside of the channels that are normally used for data.
P
packet — A unit of data transmitted across the network that includes control information along with
actual content.
payload — The data in a packet that follows the TCP and UDP header data.
PCAP (packet capture) file — A file that consists of data packets that have been sent over a network.
policy — The set of rules that network operators determine to be acceptable or unacceptable for their
network.
POP (Post Office Protocol) — A TCP/IP email protocol for retrieving messages from a remote server.
port — A field in TCP and UDP packet headers that corresponds to an application level service (for
example TCP port 80 corresponds to HTTP).
prefix — The initial part of a network address, which is used in address delegation and routing.
protection category — A group of related protection settings that detect a specific type of attack traffic.
protection group — A collection of one or more protected hosts that are associated with a specific type
of server.
protection level — Defines the strength of protection against a network attack and the associated
intrusiveness and risk of blocking clean traffic. The protection level can be set globally or for
specific protection groups.
protection mode — A state within an inline deployment mode, in which the mitigations are either active
or inactive.
protection settings — The criteria by which APS defines clean traffic and attack traffic.
protocol — A well-defined language used by networking entities to communicate with one another.
R
RADIUS (Remote Authentication Dial In User Service) — A client/server protocol that enables
remote access servers to communicate with a central server to authenticate dial-in users and
authorize their access to the requested system or service.
rate limit — The number of requests, packets, bits, or other measurement of data that a host is allowed
to send within a specified amount of time.
RDN (Registered Domain Name) — A domain name as registered, without any preceding node
information (for example, “example.net” instead of www.example.net).
redundancy — The duplication of devices, services, or connections so that, in the event of a failure, the
duplicate item can perform the work of the item that failed.
refinement — The process of continually gathering information about anomalous activity that is
observed on a network.
regular expression — A standard set of rules for matching a specified pattern in text. Often abbreviated
as regex or regexp.
report — An informational page that presents data about a traffic type or event.
router — A device that connects one network to another. Packets are forwarded from one router to
another until they reach their ultimate destination.
S
secret key — A secret that is shared only between a sender and receiver of data.
server type — A class of servers that APS protects and that is associated with one or more protection
groups.
shared secret — A word or phrase that APS Console uses to authenticate the internal communication
between itself and APS devices.
signature — A pattern or profile of traffic that suggests or represents an attack. Also known as a
fingerprint.
SIP (Standard Initiation Protocol) — An IP network protocol that is used for VoIP (Voice Over IP)
telephony.
SMTP (Simple Mail Transfer Protocol) — The de facto standard protocol for email transmissions
across the internet.
SNMP (Simple Network Management Protocol) — A standard protocol that allows routers and other
network devices to export information about their routing tables and other state information.
span port — A designated port on a network switch onto which traffic from other ports is mirrored.
SSH (Secure Shell) — A command line interface and protocol for securely accessing a remote computer.
SSH is also known as Secure Socket Shell.
SSL (Secure Sockets Layer) — A protocol for secure communications on the internet for such things as
web browsing, email, instant messaging, and other data transfers.
SSL certificate — A file that is installed on a secure web server to identify a web site and verify that the
web site is secure and reliable.
stacked graph — A graph in an Arbor Networks product that displays multiple types of data in a color-
coded stack.
STIX™ (Structured Threat Information eXpression) — A language that describes cyber threat
information in a standardized and structured manner.
syslog — A file that records certain events or all of the events that occur in a particular system. Also, a
service for logging data.
T
TACACS+ (Terminal Access Controller Access Control System +) — An authentication protocol
common to UNIX networks that allows a remote access server to forward a user’s login password
to an authentication server to determine whether that user is allowed to access a given system.
TCP (Transmission Control Protocol) — A connection-based, transport protocol that provides reliable
delivery of packets across the internet.
TCP/IP — A suite of protocols that controls the delivery of messages across the internet.
TLS (Transport Layer Security) — An encryption protocol for the secure transmission of data over the
internet. TLS is based on, and has succeeded, SSL.
U
UDP (User Datagram Protocol) — An unreliable, connectionless, communication protocol.
unblock — To remove a source or destination from the temporarily blocked list without adding it to the
whitelist.
UNC (Universal Naming Convention) — A standard which originated from UNIX for identifying
servers, printers, and other resources in a network.
URI (Uniform Resource Identifier) — A protocol, login, host, port, path, etc. in a standard format used
to reference a network resource, (for example http://example.net/).
UTC (Universal Time Coordinated) — The time zone at zero degrees longitude, which replaces GMT as
the world time standard.
V
vAPS — The virtual version of APS that is hardware-independent. vAPS contains all of the APS software
packages and configurations but does not require a physical APS appliance.
VLAN (Virtual Local Area Network) — Hosts connected in an infrastructure that simulates a local area
network, when the hosts are remotely located, or to segment a physical local network into smaller,
virtual pieces.
VoIP (Voice over Internet Protocol) — Routing voice communications (such as phone calls) through
an IP network.
volumetric attack — A type of DDoS attack that is generally high bandwidth and that originates from a
large number of geographically distributed bots.
VPN (Virtual Private Network) — A private communications network that is often used within a
company, or by several companies or organizations, to communicate confidentially over a public
network using encrypted tunnels.
W
WAN (Wide Area Network) — A computer network that covers a broad area. (Also Wireless Area
Network, meaning a wireless network.)
whitelist — A list of hosts whose traffic is passed without further inspection. To add a host to the whitelist.
widget — A graphical element in a user interface that displays information about an application and
allows the user to interact with the application.
X
XML (eXtensible Markup Language) — A metalanguage written in Standard Generalized Markup
Language (SGML) that allows one to design a markup language for easy interchange of documents
on the World Wide Web.
syntax
S FCAP expressions 342
syntax, commands 9, 342
scheduled backups
syslog notifications
about 330
about 67
configuring 44
configuring 70
search engine
examples 339
web crawler support 59
system alerts
server types
configuring 42
about 92
System Information summary 311
adding 98
custom server types 98
deleting 98 T
duplicating 99 tables
filter lists for 160, 164 sorting by column 24
limits 92 TCP
restoring default settings 108 idle connections 151
settings, configuring 100 payload inspection 140
standard server types 92 TCP Connection Limiting settings 150
viewing 96 TCP Connection Reset settings 151
Server Types page 100 TCP SYN Flood Detection settings 153
services traffic 214 temporarily blocked hosts
sign-on in blocked hosts log 260
from APS Console 15 temporarily blocked sources
SIP malformed 125 in blocked hosts log 260
SIP Request Limiting settings 145 temporary ports in Services view 214
slow HTTP attack threat
preventing 127 blocked 269
SNMP notifications threat categories, ATLAS
about 67 about 54
configuring 69 threat category
SNMP polling viewing 269
about 34 threat policies, AIF 52
agent community 32, 35 threat policy, ATLAS
enabling 34 about 54
source of attack 255 categories 54
Spoofed SYN Flood Prevention settings 146 confidence index 56
automating 147 confidence value 56
SSL threshold, bandwidth alerts
attack, prevention 155 about 223-224
certificate, custom 47 timeframe, display
stacked graph 28 blocked hosts log 264
standard server types 92 changing 28
status View Protection Group page 194
ATLAS Intelligence Feed 62 TLS Attack Prevention settings 155
Summary page top domains per protection group 208
audit trail information 313 top IP locations per protection group 210
System Information 311 top protocols per protection group 212
viewing 310 top services per protection group 214
support, contacting 10 top URLs per protection group 206
SYN flood total traffic alert 223
spoofed 146-147 traffic
TCP 153 blocking, see block traffic 168
monitoring 246
V
version number, APS Console 23
View Protection Group page 194
blacklisting countries 211
To read the complete end user license agreement online, click one of the following links: