Defensive filter modes

Each defensive filter has a mode setting of block or simulate. The defensive filter's mode is set when the filter is created or updated by the ipsec command.

By default, defensive filters are in block mode, causing traffic to be discarded. A defensive filter in simulate mode simulates a block and lets you monitor the impact of enabling defensive filters without discarding traffic.

When a packet matches a defensive filter and the mode is simulate, a message is logged indicating that the packet would have been discarded, but the packet is not discarded and IP filtering continues. The packet can subsequently match a defensive filter that is in block mode and be discarded, but the packet will not match another simulation filter.

The DMD configuration file also provides the mode settings Active, Simulate, or Inactive on the DmStackConfig statement.

Table 1 summarizes the interaction between the mode setting on the DmStackConfig statement and the mode setting in individual filters set by the ipsec command.

Table 1. Interaction between the mode setting on the DmStackConfig statement and the mode setting in individual filters
  Mode setting on the DmStackConfig statement
  Active Simulate Inactive
Individual filter mode set by the ipsec command Block Block the packet Simulate blocking the packet No defensive filters
Simulate Simulate blocking the packet Simulate blocking the packet No defensive filters
Tips:

For more information about the DmStackConfig statement, see z/OS Communications Server: IP Configuration Reference. For more information about adding or updating a defensive filter with the -F option of the ipsec command, see z/OS Communications Server: IP System Administrator's Commands.