Setting Firewall Rules based on Incoming Activity by IP Address with the Rule Wizard
To set rules based on the incoming activity analyzed for the Rule Wizard, open the Plan Incoming IP Security screen, as shown in Analyzing Recent Data on Incoming Activity by IP Address with the Rule Wizard (STRFW > 2 > 42).
Plan Incoming IP Security Type choices, press Enter. Subset . . 1=Statistics 2=Set by use 3=Allow by use 4=Delete 5=DSPFWLOG 9=Add similar C>R=Current to Revised Y Allowed Y=Allow Specify revised authority in the R column. N Rejected N=Reject Press Enter to apply revised authority. Y Allowed (by generic* rule) FTP/ N Rejected (by generic* rule) RE- Tel DB TCP RMT DDM/ Fil Number of Logged Entries EXEC net Srv SGN Srv DRDA Srv FTP/REX Telnet ---DB--- File Opt IP-Address C>R C>R C>R C>R C>R C>R C>R TCPSGN -RMT-- DDM/DRDA Srv 1.1.1.137 N N Y N N N N 24 1.1.1.139 Y S S Y N Y Y 218 Bottom F3=Exit F6=Add New F8=Print F11=Alt.view F12=Cancel |
To set new rules corresponding to activity seen for the IP Address, enter 2 in the Opt field for that address.
The Update Incoming IP Firewall window appears:
Plan Incoming IP Security Type choices, press Enter. Subset . . Update Incoming IP Firewall New information is about to OVERLAY existing one: R D FTP/ TEL D TCP M D FIL ) IP Subnet REXEC NET B SGN T M SRV New 1.1.1.139 255.255.255.255 N N Y N N N N O Existing 1.1.1.139 255.255.255.255 Y S S Y N Y Y Write this rule . . . . . . . Y Y=Yes, N=No Same answer to all . . . . . Y=Yes, N=No F12=Cancel Bottom F3=Exit F6=Add New F8=Print F11=Alt.view F12=Cancel |
In this case, the only activity from IP address 1.1.1.77 requested access to the file server. Therefore, the new rule would allow access to the file server and block access to all the others.
To set new rules corresponding to how activity differed from the existing rules, enter 3 in the Opt field for that address.
The Update Incoming IP Firewall window appears:
Plan Incoming IP Security Type choices, press Enter. Subset . . Update Incoming IP Firewall New information is about to OVERLAY existing one: R D FTP/ TEL D TCP M D FIL ) IP Subnet REXEC NET B SGN T M SRV New 1.1.1.139 255.255.255.255 Y S Y Y N Y Y O Existing 1.1.1.139 255.255.255.255 Y S S Y N Y Y Write this rule . . . . . . . Y Y=Yes, N=No Same answer to all . . . . . Y=Yes, N=No F12=Cancel Bottom F3=Exit F6=Add New F8=Print F11=Alt.view F12=Cancel |
Since the only difference between the existing rules and the actual activity for IP address 1.1.1.77 was that access was requested for the file server, which would previously have been rejected, the setting for that server would be changed from N to Y.
To save changes and exit this window, press Enter. The Rules Wizard saves the rule being changed and removes the line for that IP Address from the screen. You can see the resulting rule on the Dynamic Filtering- Incoming IP Address Security screen, as shown in Setting Firewall Rules for Incoming Activity by IP Addresses (STRFW>2 > 1).
To exit this window without saving changes, press the F12 key. The window closes. The changes that would have been made are marked in the columns for those servers in the lines for those IP addresses on the screen. You can then further work with the rules and save them manually, as shown in Analyzing Recent Data on Incoming Activity by IP Address with the Rule Wizard.