Rule Catalog
SentriFlow includes a comprehensive library of security validation rules covering authentication, encryption, access control, logging, and network hardening across all supported vendors.
Rules are organized by vendor and category. Use the filters below to find rules relevant to your network equipment.
Statistics
Browse Rules
AOSCX-IF-001MediumAdd a description to physical interfaces for documentation.
AOSCX-L2-001MediumConfigure "vlan trunk allowed <vlans>" on trunk interfaces.
AOSSW-L2-001MediumAdd a name to VLANs for documentation using "name <vlan-name>".
AOSSW-SEC-001HighConfigure a manager password for administrative access.
ARI-INT-001LowAdd description to interface: description <text>
ARI-MLAG-001HighMLAG configuration requires: domain-id, peer-link, peer-address, and local-interface.
ARI-SYS-001MediumConfigure hostname using: hostname <device-name>
ARU-NTP-001MediumConfigure NTP server for accurate time synchronization.
ARU-SEC-001HighEnable SSH server for secure remote management. Disable telnet if enabled.
ARUWLC-AAA-001HighConfigure "host <ip-address>" for the RADIUS server.
ARUWLC-WLAN-001HighConfigure "opmode wpa2-aes" or "opmode wpa3-sae-aes" for secure encryption.
CUM-BGP-001MediumAdd "bgp router-id <ip>" to explicitly set router ID.
CUM-BR-001MediumAdd "bridge-vids <vlan-ids>" to define allowed VLANs on the bridge.
CUM-IF-001MediumAdd "alias <description>" under the interface stanza.
EXOS-SEC-001MediumEnable SSH2: enable ssh2
EXOS-SYS-001MediumConfigure sysname using: configure snmp sysname "<name>"
EXOS-VLAN-001LowUse descriptive VLAN names: create vlan "<meaningful-name>" tag <id>
FGT-ADMIN-001HighConfigure trusted hosts for each admin user using "set trusthost1", "set trusthost2", etc.
FGT-POL-001MediumEnable logging on all firewall policies using "set logtraffic all" or "set logtraffic utm".
FGT-SYS-001MediumConfigure hostname under "config system global" using "set hostname <name>".
HUAWEI-IF-001MediumAdd a description to the interface using "description <text>" command.
HUAWEI-SYS-001MediumConfigure system name using "sysname <hostname>" command.
HUAWEI-VTY-002HighConfigure SSH-only access on VTY lines using "protocol inbound ssh".
JSON-CISCO-001MediumTrunk ports should have explicit allowed VLAN list
JSON-CISCO-002LowAccess ports should have spanning-tree portfast enabled
JSON-CISCO-003MediumAll interfaces should have a description
JSON-CISCO-004HighTrunk ports should disable DTP (Dynamic Trunking Protocol)
JSON-CISCO-005HighVTY lines should have access-class configured for SSH access control
JSON-COMMON-001LowInterfaces should have a description for documentation
JSON-JUNOS-001HighSSH should be configured for version 2 only
JSON-JUNOS-002HighTelnet service should be disabled
JSON-JUNOS-003MediumLogin banner should be configured
JSON-JUNOS-004MediumOSPF areas should have authentication configured
JSON-JUNOS-005MediumRemote syslog server should be configured
JUN-BGP-001MediumConfigure "router-id" under routing-options stanza.
JUN-FW-001MediumAdd a final term with "then discard" or "then reject" to explicitly deny unmatched traffic.
JUN-SYS-001HighConfigure "root-authentication" under system stanza with encrypted-password or ssh-rsa.
MIK-FW-001HighAdd drop rule for input chain: add chain=input action=drop
MIK-SEC-001MediumDisable unused services: /ip service disable telnet,ftp,www,api,api-ssl
MIK-SYS-001MediumConfigure system identity: /system identity set name=MyRouter
NET-AAA-003HighUse "enable algorithm-type scrypt secret <password>" for strong encryption.
NET-ACCESS-001MediumAdd "switchport mode access" to explicitly configure access mode.
NET-DOC-001MediumEnsure interfaces have descriptive labels for operational clarity.
NET-IP-001HighEnsure IP addresses are not Multicast, Broadcast, or Network ID addresses.
NET-SEC-001HighUse "secret" instead of "password", or encrypt with type 7/8/9.
NET-TRUNK-001MediumAdd "switchport nonegotiate" to disable DTP on trunk ports connected to non-Cisco devices.
NOKIA-BGP-001MediumConfigure BGP router-id: bgp > router-id <ip-address>
NOKIA-PORT-001MediumAdd description to port: port X/Y/Z > description "<description>"
NOKIA-SYS-001MediumConfigure system name using: system > name "<hostname>"
PAN-SEC-001MediumEnable log-end (and optionally log-start) on all security rules.
PAN-SYS-001MediumConfigure hostname under deviceconfig > system.
PAN-ZONE-001HighApply a Zone Protection Profile to each zone to protect against flood attacks and reconnaissance.
VOSS-INT-001LowConfigure default VLAN: default-vlan-id <vlan-id>
VOSS-SYS-001MediumConfigure system name: snmp-server name "<name>"
VOSS-VLAN-001LowConfigure I-SID for VLAN: vlan i-sid <vlan-id> <isid>
VYOS-FW-001MediumSet "default-action drop" or "default-action reject" for each firewall ruleset.
VYOS-IF-001MediumAdd "description" to each physical interface.
VYOS-SEC-001HighUse "encrypted-password" with a pre-hashed password, or let VyOS hash it during configuration.
VYOS-SYS-001MediumConfigure "host-name" under system stanza.
Rule Severity Levels
| Level | Badge | Description |
|---|---|---|
| Error | High | Critical security issues that should be fixed immediately |
| Warning | Medium | Important best practices that should be addressed |
| Info | Low | Recommendations for improved security posture |
Rule Categories
Rules are organized into functional categories:
- Network-Segmentation - VLAN, trunk, and access port configuration
- Authentication - SSH, TACACS+, RADIUS, and local authentication
- Encryption - SSL/TLS, IPsec, and encryption settings
- Access-Control - ACLs, firewall rules, and zone policies
- Logging - Syslog, SNMP traps, and audit logging
- Hardening - Service disabling, banner configuration, and timeouts
Compliance Framework Mappings
Many rules include mappings to common compliance frameworks:
- NIST 800-53 - Federal information security controls
- CIS Benchmarks - Center for Internet Security hardening guides
- PCI DSS - Payment Card Industry Data Security Standard
- HIPAA - Healthcare information privacy requirements
Creating Custom Rules
Need rules specific to your organization? See the Rule Authoring Guide to create custom validation rules in JSON or TypeScript.