Submit a ticketCall us

Welcome to the NEW Success Center. Search all resources (documentation, videos, training, knowledge base articles) or browse resources by product. If you are unable to find what you are looking for, please contact us at





Home > Success Center > Log & Event Manager (LEM) > Block IP Active Response

Block IP Active Response

Created by Interspire Import, last modified by MindTouch on Jun 23, 2016

Views: 828 Votes: 0 Revisions: 10


Use the Block IP active response to block an IP address at your firewall using your LEM appliance. This action is useful for blocking port scanners and can be automated in a LEM rule or executed manually from the Respond menu in the LEM Console.


You can use the Block IP active response with the following firewalls/modules.

  • Cisco PIX
  • Cisco ASA
  • Cisco Firewall Services Module
  • FortiGate
  • Juniper NetScreen
  • Check Point OPSEC
  • SonicWALL
  • WatchGuard Firebox (including Vclass)

Configure the Active Response connector for one of the firewalls listed above on your LEM appliance.

To configure the Active Response connector for your firewall:

  1. Open your LEM console and log in as an administrator.
  2. Click the Manage tab, and then select Appliances.
  3. Click the gear icon to the left of your LEM Manager, and then select Connectors.
  4. Select Firewalls from the Category list, and enter active response in the search box at the top of the Refine Results pane.
  5. Click the gear icon next to the connector for your firewall, and then select New.
  6. Complete the Connector Configuration form according to your firewall's specifications.
    Note: Generally, all you will have to enter is your firewall address and credentials. Some connectors, however, require more information. 
  7. Click Save.
  8. Click the gear icon next to the new connector (denoted by an icon in the Status column), and then select Start.
  9. Click Close to exit the Connector Configuration window.

Additional Information

The Block IP active response creates a rule on your firewall to block the IP addresses you specify. To allow an IP address through your firewall, delete or modify the rule on your firewall as appropriate.

  1. Overview
  2. Requirements
  3. Additional Information
Last modified
19:54, 22 Jun 2016