Event Trigger Policies

Create a Quarantine IP Group

We will temporarily place users who violate our DPI and Connection Event Triggers into a Transient IP Group.  We will assign the Quarantine Group to the Triggers, and while in this group, users will not have internet access and will be directed to the Splash Portal associated with the Customer Onboarding Policy.

Click Create New in the Link Controls scaffold.

Field Value
Name Quarantine
Priority 7
Policy Customer Onboarding

Create a new Connections Trigger

Click Create New in the Connections Triggers scaffold.

Field Value
Name 1000 Connections
Policies Basic, Free
Max Connections 1000
Duration 15 minutes
IP Group Quarantine
Flush Connection States checked

Create a new Quota Trigger

Click Create New in the Connections Triggers scaffold.

Field Value
Name Premium Abuser slowdown
Policies Premium
Download 50 GB
Upload 25 GB
Window 7 days
Duration 1 days
Account Group Basic

Create a new Remote DPI Signature

Click Create New in the Remote DPI Signature scaffold.  Accept the defaults, which will pull from emergingthreats.net

Edit the Emerging Threats Remote DPI Signature

Click Edit on the Emerging Threats Remote DPI Signature record.  Review the list of categories and select several categories by command or control clicking items in the box.

Create a new DPI Trigger

Click Create New in the DPI Triggers scaffold.

Field Value
Name Quarantine Bad Behavior
Policies Basic, Free, Premium
Remote Signatures Emerging Threats
IP Group Quarantine
Duration 30 Minutes
Flush connection states Checked

Review Policy Dashboard

Click Policies in the top menu. The Policy Dashboard now illustrates our policy enforcement configuration. 

Update Basic Account Group Priority

When users trigger the Premium Quota Trigger, they are temporarily placed into the Basic Account Group (a transient group membership).  Currently, the groups priority is the same as the Premium Account Group (all account groups are set to 4 by default).  We need to increase the priority of the Basic Account Group so that it takes priority over the devices other group memberships.

Click Edit on the Basic Account Group.

Increase the priority to 5

Review Final Policy Dashboard

Logs Hits Trigger

The Log Hits Trigger function automatically adds identified IP addresses to a WAN target for a predefined timeframe when events such as repeated failed SSH login attempts or excessive traffic directed at a web server occur. This function allows for targeted restrictions on specific types of traffic, including blocking SSH, HTTP, or HTTPS access. This functionality works on both the LAN and the WAN. The configuration outlined below is intended for events on the WAN side of the rXg.

Create Blacklisted WAN Target Click on Identity :: Definitions. Create a WAN Target definition.

Add WAN Target to Admin ACL Click on System :: Admins. Modify ACL by adding a defined WAN Target.

Create Log Hits Triggers

Proceed to Policies :: Event Triggers. - Click create. - Name the trigger for identification. - Select the Policy that will be enforced. - Define Enforcement Thresholds. - Specify the Duration of transient membership. - Assign a blacklisted WAN target. - Select an email notification for the Log Hits Trigger Record.

Viewing Event Logs Navigate to Archives :: Trigger Logs for detailed event logs.

Additionally the Trigger Logs button under each listed Log Hits Trigger will display the log as well.

IPs are automatically removed after the expiration of the set threshold time duration.


Cookies help us deliver our services. By using our services, you agree to our use of cookies.