Safe List
Use the Deception > Safe List page to add an IP address that is considered legitimate so that it does not generate an Event or Incident when accessing decoys. For example, the IP address of a monitoring system that is polling the network.
The Safe list page displays the following information:
Name |
The safe list name. |
IP/Mask |
Specify the IP address or subnet from where the connection originates. |
Source Ports |
Specify the source ports from where the connection originates. |
Destination Ports |
Specify the destination ports on the network where the connection terminates. |
Appliance |
This column indicates the source of the safelist, either local (manager) or remote (remote appliance). It is only visible when the manager operates in Central Management mode. |
Decoy |
Specify the name of the decoy for which you want to apply the safelist rule. |
Status |
Indicates the status of the safelist rule ( Enabled or Disabled). |
Block All |
Enforces Network Access Control based on the specified IP address or subnet in the IP/Mask field, along with the designated Appliance and Decoy. When enabled, all traffic originating from the specified IP address or subnet that matches the designated Appliance and Decoy will be blocked. |
To add a new Safe List IP address:
- Go to Deception > Safe List.
- Click Add New Safe List IP
- Coinfigure the safe list settings and click OK.
Enable
Select Enable to activate the safe list.
Name
Enter a description of the list. For example, Safe_Network.
IP/Mask
Enter the IP address or subnet from where the connection originates.
Block All
Enforces Network Access Control based on the specified IP address or subnet in the IP/Mask field, along with the designated Appliance and Decoy. When enabled, all traffic originating from the specified IP address or subnet that matches the designated Appliance and Decoy will be blocked.
When Block ALL is active, traffic that meets all criteria specified in the safe list rule does not trigger an Event or Incident when accessing decoys. Instead, it produces a
matched safe list rule
log. However, if the Destination Ports or Services fields do not match, an Incident is logged with the keywordSafe list
and a corresponding syslog with keywordOperation=Safe_List
. In both cases, the traffic is blocked.Source Ports
Enter the source ports from where the connection originates.
Destination Ports
Enter the destination ports on the network where the connection terminates.
Services
Select the name of the services used to connect to the network.
Appliance
Select an appliance from the list.
Decoy
Select the decoy name for you want to apply the safe list rule.