Important

   

Starting version 8.9.03, BMC Network Automation is renamed to TrueSight Network Automation. This space contains information about BMC Network Automation 8.9.02 and previous versions. For TrueSight Network Automation 8.9.03 and later releases, see the TrueSight Network Automation documentation.

Viewing the rules listing

Rules are used to provision, update, and audit or enforce a configuration standard. BMC Network Automation rules are listed on the Rules page. Through the Rules Filter page, you can filter the list of rules based on various attributes.

To view the list of rules

  1. Navigate to Network > Scripts > Rules.


    (Applicable only for version 8.9.01 and later) In the figure, the  icon indicates that a rule is not correctable and the  icon indicates that a rule set is disabled.

    A rule is correctable if it meets the following conditions:
    • The rule belongs to an enabled rule set.

    • The rule is active
    • One or more corrective actions are defined for the rule.
    • If all of the corrective actions require that a compliant configuration must be constructed (for example, all the actions are Deploy To Active or Deploy To Stored for a configuration complying with this rule), the rule grammar is correctable. That means the system must be able to generate the compliant configuration by adding or removing lines. Some combinations of domain/subject type and frequency cannot be corrected (for example, domain of OS Image, or an additive subject of Pattern/Patterns with no corrections).
  2. (Optional) Perform one of the following tasks by using the menu options that are available on the Rules page:

    Menu option
    Description
    ViewsDisplay rules matching a favorite view. See About lists and views and Managing and sharing views.
    FilterFilter the rules list based on selected criteria.
    AddAdd a rule. See Adding or editing a rule.
    Print ViewPrint the rule list.
    RefreshRefresh the list with any recent updates.
    HelpDisplay help for rules.
  3. (Optional) Perform one of the following actions by clicking an icon in the Actions column on the Rules page:

    Icon
    Action
    Description
    ViewDisplay details about the rule
    EditEdit the rule. See Adding or editing a rule.
    CopyCopy the rule
    Note: Any association between a rule and a security vulnerability is not copied.
    DeleteDelete the rule

Back to top

To define a filter for the rules listing

  1. Select Network > Scripts > Rules.
  2. Click the Filter menu option above the list of rules.

  3. Enter the following optional parameters as described in the following table:


    Rule filter parameters

    Parameter

    Description

    Rule Set Name

    Enter the rule set name. Rules that are in the selected rule set or sets are displayed. The search is case insensitive.

    Name

    Enter the rule name. The search is case insensitive.

    Device Type

    Select a vendor and (optionally) a device type from the drop-down lists.

    Exclude Rules Associated With All Device TypesBy default, a rule associated with all device types matches every vendor and device type you might be filtering on. Select this option to hide these rules.

    Contents

    Enter a string corresponding to the contents of one or more rules. This search finds text in the Trigger, Domain, and Subject fields. For example, you can enter  ${global* to search for global substitution parameters in any of these fields.

    Violation Severity

    Select the types of violations that the rule or rules trigger. By default, all severity options are selected.

    (Applicable only for version 8.9.01 and later) CorrectableSelect the types of rules to be filtered as follows:
    • Include rules which cannot be corrected
    • Include rules that are correctable via the Deploy to Active span action
    • Include rules that are correctable via the Deploy to Stored span action
    • Include rules that are correctable via the Remediate span action
    Activation DateSelect or specify an activation date.
    Deactivation DateSelect or specify a deactivation date.
    CVE ID(s)Specify any number of security vulnerability CVE IDs, to locate rules with one of the specified CVE IDs.
    Note: Wildcards are not supported; only exact matching is supported. The matching is case insensitive.

    Category

    Select a category.

    Note

    • Wild cards are permitted in all fields except in CVE ID(s). For example, entering *level* for Rule Set Name displays all rules in rule sets whose name contains the string, level.
    • The search is not case-sensitive.
    • This dialog box contains any filterable user-defined dynamic fields that have been defined for rules. You can search on the basis of these fields.
  4. Click Submit.
    The rules list is displayed with the indication View: [Filtered Rules], as shown in the following figure. The filter criteria also are displayed at the top of each column.

  5. Perform any of the following optional actions:
    • To refine the filter, click Filter again. Your previous selections persist in the dialog box.
    • To save this view for re-use, click Views > Save View.
    • To remove the filter, click Views > Show All Rules.

Back to top

Was this page helpful? Yes No Submitting... Thank you

Comments