Configuring Firewall
To configure Firewall, select 81. System Configuration from the Firewall Main Menu.
The iSecurity (part I) Global Parameters screen appears:
iSecurity (part I) Global Parameters 20/01/20 17:25:58 / Firewall *FYI* SIEM Support 1. General Definitions 70. Main Control-----> Active 2. Additional Settings 71. SIEM 1: syslog#1 N 3. User Exit Programs 72. SIEM 2: Syslog#2 N 4. Transaction Post Processing 73. SIEM 3: Syslog#3 N 5. Intrusion Detection System 74. JSON N 6. Password Exit Programs 7. Enable ACTION (CL Script + more) 79. Setting Severity for Servers 9. Log Retention Other Products Definitions Active General 11. Command N 81. iSecurity/Base Configuration 21. Screen N 91. Language Support 31. Password N 99. Copyright Notice 41. MFA Selection ===> Release ID . . . . . . . . . . . . . . ########## ####### ### #### # Authorization code . . . . . . . . . . ############ # #### F3=Exit F22=Enter authority code |
To set general definitions for Firewall, including triggering emergency override or FYI simulation modes and determining the order in which logs and queries are displayed, select 1. General Definitions. The Firewall General Definitions screen appears, as shown in Setting General Definitions for Firewall.
To set additional definitions, including aspects of SQL handling and whether to inherit certain in-product authorities, select 2. Additional Settings. The Firewall Additional Settings screen appears, as shown in Setting Additional Definitions for Firewall.
To set the programs called after requests are accepted or rejected, for particular applications, or before the system is powered down, select 3. User Exit Programs. The Firewall User Exit Programs screen appears, as shown in Setting User Exit Programs for Firewall.
To set the data queues used to bind Firewall with external products when transactions are accepted or rejected, select 4. Transaction Post Processing. The Firewall Transaction Post Processing Data Queues screen appears, as shown in Setting Data Queues for Post-Processing of Firewall Transactions.
To set how Firewall reacts to intrusions, select 5. Intrusion Detection System. The Firewall Intrusion Detection System screen appears, as shown in Setting Up a Firewall Intrusion Detection System.
To set the programs that supply and validate passwords for FTP and WSG, select 6. Password Exit Programs. The Firewall Password Exit Programs screen appears, as shown in Setting Password Exit Programs for FTP in Firewall.
To enable or disable iSecurity Action for Firewall, select 7. Enable Action (CL Script + more). The Enable Real-Time Detection screen appears, as shown in Enabling Action for Firewall.
To set how long logs are retained and how they are backed up, select 9. Log Retention. The Log & Journal Retention screen appears, as shown in Setting Log Retention and Backup for Firewall.
To enter your authorization code for Firewall, press the F22 (Shift+F10) key. Type the code in the Authorization code field, then press Enter.