1 |
Prefix |
{prefix} |
Prefix |
Returns the prefix of the anomaly, which is the victim IP/CIDR mask for inbound anomalies, or the source IP/CIDR mask for outbound anomalies |
2 |
IP Address |
{ip} |
Prefix |
Returns the IP of {prefix}, without the CIDR mask |
3 |
IP Version |
{ip_version} |
Prefix |
Returns the IP version of {prefix}, either 4 or 6 |
4 |
N/A |
{ip_dns} |
String |
Returns the reverse DNS of {ip}. If the DNS lookup does not return a valid DNS PTR record then it returns {ip} |
5 |
IP AS Number |
{ip_asn} |
Integer |
Returns the AS Number of {ip}. If the GeoIP database does not provide an AS number, it returns 0 |
6 |
CIDR |
{cidr} |
Integer |
Returns the CIDR mask of {prefix} |
7 |
IP Group |
{ip_group} |
String |
Returns the IP Group of {prefix} |
8 |
Sensor |
{sensor} |
String |
Returns the name of the Sensor that detected the anomaly. For SNMP Sensor and Flow Sensor the format is Sensor Name [Interface Name] |
9 |
Sensor Name |
{sensor_name} |
String |
Returns the name of the Sensor that detected the anomaly. For SNMP Sensor and Flow Sensor it does not return the Interface Name |
10 |
Sensor Group |
{sensor_group} |
String |
Returns the Device Group selected in the Sensor configuration |
11 |
Sensor IP |
{sensor_ip} |
Prefix |
Returns the IP address of the server running the Sensor |
12 |
Sensor Type |
{sensor_type} |
String |
Returns the type of Sensor: Packet Sensor, Flow Sensor, SNMP Sensor or Sensor Cluster |
13 |
Sensor ID |
{sensor_id} |
Integer |
Returns the Server ID of server running the Sensor |
14 |
Flow Exporter IP |
{router_ip} |
Prefix |
Returns the IP address of the flow exporter. It is empty if the Sensor is not a Flow Sensor |
15 |
IP Zone |
{ipzone} |
String |
Returns the IP Zone used by the Sensor |
16 |
IP Zone Prefix |
{prefix_ipzone} |
Prefix |
Returns the most specific prefix that includes the {prefix} |
17 |
IP Zone Parent Prefix |
{parent_prefix_ipzone} |
Prefix |
Returns the parent of the most specific prefix that includes the {prefix} |
18 |
Response |
{response} |
String |
Returns the Response activated by the threshold rule |
19 |
Response Actions |
{response_actions} |
String |
Returns the list of actions executed by the Response. Contains only the actions that have the parameter Record Action checked |
20 |
Threshold Template |
{template} |
String |
Returns the Threshold Template that includes the threshold rule, if it exists |
21 |
Expiration Delay |
{expiration} |
Integer |
Returns the number of seconds of inactivity that must pass before the anomaly expires |
22 |
Captured Packets |
{captured_pkts} |
Integer |
Returns the number of packets captured successfully, if the Response contains an action for capturing packets |
23 |
BGP Log Size |
{bgplog_bytes} |
Integer |
Returns the size of the BGP announcement log which is non-zero only when a BGP routing update was triggered for the anomaly |
24 |
Anomaly |
{anomaly} |
String |
Returns a description of the threshold rule that triggered the anomaly |
25 |
Anomaly # |
{anomaly_id} |
Integer |
Returns a unique identification number of the anomaly |
26 |
Anomaly Classification |
{classification} |
String |
Returns the clasification of the anomaly by Console users: Unclassified, False Positive, Possible Attack, Trivial Attack, Verified Attack or Crippling Attack |
27 |
Anomaly Comment |
{comment} |
String |
Returns the user-submitted comment about the anomaly, if it exists |
28 |
Direction |
{direction} |
String |
Returns the direction of the traffic that triggered the anomaly: incoming or outgoing |
29 |
N/A |
{Direction} |
String |
Returns {direction} but with an upper first letter |
30 |
N/A |
{direction_to_from} |
String |
Returns to for inbound anomalies and from for outbound anomalies |
31 |
N/A |
{direction_receives_sends} |
String |
Returns receives for inbound anomalies and sends for outbound anomalies |
32 |
Domain |
{domain} |
String |
Returns the corresponding Domain from the threshold. It is internal IP when CIDR mask is 32 for IPv4 or 128 for IPv6, subnet in other cases, or external IP for similar thresholds set on 0.0.0.0/0 |
33 |
N/A |
{Domain} |
String |
Returns {domain} but with an upper first letter |
34 |
Anomaly Class |
{class} |
String |
Returns threshold for threshold-based anomalies and profile for profiling-based anomalies |
35 |
Threshold Type |
{threshold_type} |
String |
Returns the threshold value type, which can be either absolute or percentage |
36 |
Anomaly Decoder (Protocol) |
{decoder} |
String |
Returns the decoder used to detect the anomaly |
37 |
Comparison |
{operation} |
String |
Returns the comparison function used by the threshold rule: over or under |
38 |
N/A |
{comparison} |
String |
Returns > when {operation} is over, and < when {operation} is under |
39 |
Unit |
{unit} |
String |
Returns the measurement unit of the threshold rule: pkts/s or bits/s |
40 |
Threshold Value |
{rule_value} |
Integer* |
Returns the traffic value configured as threshold |
41 |
Computed Threshold |
{computed_threshold} |
Integer* |
Returns a threshold value dynamically adjusted for profiling-based and percentage-based anomalies |
42 |
Peak Packets/s |
{anomaly_pps} |
Integer* |
Returns the highest packets/s rate observed for the anomaly |
43 |
Peak Bits/s |
{anomaly_bps} |
Integer* |
Returns the highest bits/s rate observed for the anomaly |
44 |
Latest Packets/s |
{latest_anomaly_pps} |
Integer* |
Returns the latest packets/s rate |
45 |
Latest Bits/s |
{latest_anomaly_bps} |
Integer* |
Returns the latest bits/s rate |
46 |
Peak Value |
{value} |
Integer* |
Returns the highest value of abnormal traffic, and also the {unit} |
47 |
Latest Value |
{latest_value} |
Integer* |
Returns the latest value of abnormal traffic, and also the {unit} |
48 |
Sum Value |
{sum_value} |
Integer* |
Returns the number of packets counted during the anomaly, when the {unit} is pkts/s. For bits/s thresholds it returns the number of bits counted during the anomaly |
49 |
Peak Rule Severity |
{severity} |
Float |
Returns the ratio between the peak abnormal traffic rate and the threshold value |
50 |
Latest Rule Severity |
{latest_severity} |
Integer |
Returns the ratio between the latest abnormal traffic rate and the threshold value |
51 |
Peak Link Severity |
{link_severity} |
Integer |
Returns the ratio between the peak abnormal traffic rate and the interface’s traffic rate |
52 |
Latest Link Severity |
{latest_link_severity} |
Integer |
Returns the ratio between the latest abnormal traffic rate and the interface’s traffic rate |
53 |
Latest Link Utilization |
{latest_link_utilization} |
Integer |
Returns the percentage between the latest traffic rate reported by the IP decoder for the whole interface, and the interface Speed In/Out value configured in the Sensor configuration |
54 |
N/A |
{anomaly_log_10}, {anomaly_log_50}, {anomaly_log_100}, {anomaly_log_500}, {anomaly_log_1000} |
String |
Returns the first 10/50/100/500/1000 packets (if a packet capturing action is enabled in the Response) or flows (if Flow Collector is enabled) with the anomalous traffic |
55 |
N/A |
{attacked_isp} |
String |
Returns the abuse mailbox or the contact email of the victim’s ISP if it can be extracted from the whois database |
56 |
N/A |
{software_version} |
String |
Returns the Wanguard version |
57 |
Unique Dynamic Parameters |
N/A |
String |
This is used to prevent the execution of a Response action when there are other active anomalies that share the same user-defined criteria, expressed as a list of Dynamic Parameters. For example, if the Comparison is “equal to” and the Value “{ip} {decoder}” then the action will be executed only when there isn’t any other active anomaly to/from the same IP and the same decoder |
58 |
Custom Script Return Value |
N/A |
Integer |
This Conditional Parameter allows execution only when the script entered in the Value field returns status 0 after its execution. You can pass Dynamic Parameters as arguments for the script. Comparison must be set to equal to. It is important for the script to finish quickly, because it blocks the originating process |