8-20
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2
OL-29168-01
Chapter8 Configuring Event Action Rules
Configuring Event Action Filters
action-to-add: deny-attacker-inline
-----------------------------------------------
override-item-status: Enabled <defaulted>
risk-rating-range: 95 default: 0-100
-----------------------------------------------
override-item-status: Enabled <defaulted>
risk-rating-range: 90-100 <defaulted>
-----------------------------------------------
-----------------------------------------------
Step 11
Exit event action rules submode.
sensor(config-eve)# exit
Apply Changes:?[yes]:
Step 12
Press Enter to apply your changes or enter
no
to discard them.
For More Information
For a detailed description of all the event actions, see Event Actions, page 8-4.
Configuring Event Action Filters
This section describes event action filters, and contains the following topics:
Understanding Event Action Filters, page 8-20
Configuring Event Action Filters, page 8-21

Understanding Event Action Filters

Note
Global correlation inspection and the reputation filtering deny features do not supp ort IPv6 addresses.
For global correlation inspection, the sensor does not receive or process reputation data for IPv6
addresses. The risk rating for IPv6 addresses is not modified for global co rrelation inspection. Similarly,
network participation does not include event data for attacks from IPv6 addresses. And finally, IPv6
addresses do not appear in the deny list.
Note
Rate limiting and blocking are not supported for IPv6 traffic. If a signature is configured with a block or
rate limit event action and is triggered by IPv6 traffic, an alert is generated but the action is not carried
out.
Event action filters are processed as an ordered list and you can move filters up or down in the list. Filters
let the sensor perform certain actions in response to the event without requiring the sensor to perform all
actions or remove the entire event. Filters work by removing actions from an event. A filter that removes
all actions from an event effectively consumes the event.
Note
When filtering sweep signatures, we recommend that you do not filter the destination addresses. If there
are multiple destination addresses, only the last address is used for matching the filter.