Defensive filtering

An external security information and event manager, by analyzing and correlating messages from multiple sources and systems in the network, can take action to block attacks by installing defensive filters in your TCP/IP stack. A defensive filter is an IP filter rule to discard packets, separate from IP security filters, and is typically installed for a short duration (for example, 30 minutes) to block a specific attack or a pattern of attacks. If traffic being blocked by a defensive filter should be blocked on a long-term basis, update your configured IP security policy to add an IP security deny rule.

A defensive filter uses a combination of the following characteristics to target traffic to be discarded:

For example, a defensive filter might be installed to block all TCP traffic from IP address 10.1.1.1 that is destined for the Telnet server. The characteristics of this filter are the following characteristics:

Defensive filters are given higher priority than IP security filters. That is, IP filter processing first checks any installed defensive filters for a match against a packet, before checking the IP security filters. When a defensive filter is added to a TCP/IP stack, it is placed at the top of the filter search order.

Figure 1 provides an overview of defensive filtering.

Figure 1. Defensive filtering overview
This figure shows the interactions between the components that are involved in defensive filtering.

Defensive filters are added and managed using the z/OS® UNIX ipsec command with the -F primary option.

For more information about the ipsec command, see z/OS Communications Server: IP System Administrator's Commands.

Requirements:
Guideline: The DMD can support a maximum of 10 concurrent ipsec command connections.
Restriction: Remote management of defensive filters using a network security services (NSS) server is not supported. Management of defensive filters is provided only through the local ipsec command.