Skip to Content
Rule Catalog

Rule Catalog

SentriFlow includes a comprehensive library of security validation rules covering authentication, encryption, access control, logging, and network hardening across all supported vendors.

Rules are organized by vendor and category. Use the filters below to find rules relevant to your network equipment.

Statistics

59
Total Rules
18
High Severity
35
Medium Severity
6
Low Severity

Browse Rules

Showing 59 of 59 rules
AOSCX-IF-001Medium

Add a description to physical interfaces for documentation.

Aruba AOS-CX
AOSCX-L2-001Medium

Configure "vlan trunk allowed <vlans>" on trunk interfaces.

Aruba AOS-CX
AOSSW-L2-001Medium

Add a name to VLANs for documentation using "name <vlan-name>".

Aruba AOS-Switch
AOSSW-SEC-001High

Configure a manager password for administrative access.

Aruba AOS-Switch
ARI-INT-001Low

Add description to interface: description <text>

Arista EOS
ARI-MLAG-001High

MLAG configuration requires: domain-id, peer-link, peer-address, and local-interface.

Arista EOS
ARI-SYS-001Medium

Configure hostname using: hostname <device-name>

Arista EOS
ARU-NTP-001Medium

Configure NTP server for accurate time synchronization.

Aruba AOS-CX
ARU-SEC-001High

Enable SSH server for secure remote management. Disable telnet if enabled.

Aruba AOS-CX
ARUWLC-AAA-001High

Configure "host <ip-address>" for the RADIUS server.

Aruba WLC
ARUWLC-WLAN-001High

Configure "opmode wpa2-aes" or "opmode wpa3-sae-aes" for secure encryption.

Aruba WLC
CUM-BGP-001Medium

Add "bgp router-id <ip>" to explicitly set router ID.

Cumulus Linux
CUM-BR-001Medium

Add "bridge-vids <vlan-ids>" to define allowed VLANs on the bridge.

Cumulus Linux
CUM-IF-001Medium

Add "alias <description>" under the interface stanza.

Cumulus Linux
EXOS-SEC-001Medium

Enable SSH2: enable ssh2

Extreme EXOS
EXOS-SYS-001Medium

Configure sysname using: configure snmp sysname "<name>"

Extreme EXOS
EXOS-VLAN-001Low

Use descriptive VLAN names: create vlan "<meaningful-name>" tag <id>

Extreme EXOS
FGT-ADMIN-001High

Configure trusted hosts for each admin user using "set trusthost1", "set trusthost2", etc.

Fortinet FortiGate
FGT-POL-001Medium

Enable logging on all firewall policies using "set logtraffic all" or "set logtraffic utm".

Fortinet FortiGate
FGT-SYS-001Medium

Configure hostname under "config system global" using "set hostname <name>".

Fortinet FortiGate
HUAWEI-IF-001Medium

Add a description to the interface using "description <text>" command.

Huawei VRP
HUAWEI-SYS-001Medium

Configure system name using "sysname <hostname>" command.

Huawei VRP
HUAWEI-VTY-002High

Configure SSH-only access on VTY lines using "protocol inbound ssh".

Huawei VRP
JSON-CISCO-001Medium

Trunk ports should have explicit allowed VLAN list

Cisco IOS
JSON-CISCO-002Low

Access ports should have spanning-tree portfast enabled

Cisco IOS
JSON-CISCO-003Medium

All interfaces should have a description

Cisco IOS
JSON-CISCO-004High

Trunk ports should disable DTP (Dynamic Trunking Protocol)

Cisco IOS
JSON-CISCO-005High

VTY lines should have access-class configured for SSH access control

Cisco IOS
JSON-COMMON-001Low

Interfaces should have a description for documentation

Common
JSON-JUNOS-001High

SSH should be configured for version 2 only

Juniper Junos
JSON-JUNOS-002High

Telnet service should be disabled

Juniper Junos
JSON-JUNOS-003Medium

Login banner should be configured

Juniper Junos
JSON-JUNOS-004Medium

OSPF areas should have authentication configured

Juniper Junos
JSON-JUNOS-005Medium

Remote syslog server should be configured

Juniper Junos
JUN-BGP-001Medium

Configure "router-id" under routing-options stanza.

Juniper Junos
JUN-FW-001Medium

Add a final term with "then discard" or "then reject" to explicitly deny unmatched traffic.

Juniper Junos
JUN-SYS-001High

Configure "root-authentication" under system stanza with encrypted-password or ssh-rsa.

Juniper Junos
MIK-FW-001High

Add drop rule for input chain: add chain=input action=drop

MikroTik RouterOS
MIK-SEC-001Medium

Disable unused services: /ip service disable telnet,ftp,www,api,api-ssl

MikroTik RouterOS
MIK-SYS-001Medium

Configure system identity: /system identity set name=MyRouter

MikroTik RouterOS
NET-AAA-003High

Use "enable algorithm-type scrypt secret <password>" for strong encryption.

Cisco IOS
NET-ACCESS-001Medium

Add "switchport mode access" to explicitly configure access mode.

Cisco IOS
NET-DOC-001Medium

Ensure interfaces have descriptive labels for operational clarity.

Common
NET-IP-001High

Ensure IP addresses are not Multicast, Broadcast, or Network ID addresses.

Common
NET-SEC-001High

Use "secret" instead of "password", or encrypt with type 7/8/9.

Cisco IOS
NET-TRUNK-001Medium

Add "switchport nonegotiate" to disable DTP on trunk ports connected to non-Cisco devices.

Cisco IOS
NOKIA-BGP-001Medium

Configure BGP router-id: bgp > router-id <ip-address>

Nokia SR OS
NOKIA-PORT-001Medium

Add description to port: port X/Y/Z > description "<description>"

Nokia SR OS
NOKIA-SYS-001Medium

Configure system name using: system > name "<hostname>"

Nokia SR OS
PAN-SEC-001Medium

Enable log-end (and optionally log-start) on all security rules.

Palo Alto PAN-OS
PAN-SYS-001Medium

Configure hostname under deviceconfig > system.

Palo Alto PAN-OS
PAN-ZONE-001High

Apply a Zone Protection Profile to each zone to protect against flood attacks and reconnaissance.

Palo Alto PAN-OS
VOSS-INT-001Low

Configure default VLAN: default-vlan-id <vlan-id>

Extreme VOSS
VOSS-SYS-001Medium

Configure system name: snmp-server name "<name>"

Extreme VOSS
VOSS-VLAN-001Low

Configure I-SID for VLAN: vlan i-sid <vlan-id> <isid>

Extreme VOSS
VYOS-FW-001Medium

Set "default-action drop" or "default-action reject" for each firewall ruleset.

VyOS
VYOS-IF-001Medium

Add "description" to each physical interface.

VyOS
VYOS-SEC-001High

Use "encrypted-password" with a pre-hashed password, or let VyOS hash it during configuration.

VyOS
VYOS-SYS-001Medium

Configure "host-name" under system stanza.

VyOS

Rule Severity Levels

LevelBadgeDescription
ErrorHighCritical security issues that should be fixed immediately
WarningMediumImportant best practices that should be addressed
InfoLowRecommendations for improved security posture

Rule Categories

Rules are organized into functional categories:

  • Network-Segmentation - VLAN, trunk, and access port configuration
  • Authentication - SSH, TACACS+, RADIUS, and local authentication
  • Encryption - SSL/TLS, IPsec, and encryption settings
  • Access-Control - ACLs, firewall rules, and zone policies
  • Logging - Syslog, SNMP traps, and audit logging
  • Hardening - Service disabling, banner configuration, and timeouts

Compliance Framework Mappings

Many rules include mappings to common compliance frameworks:

  • NIST 800-53 - Federal information security controls
  • CIS Benchmarks - Center for Internet Security hardening guides
  • PCI DSS - Payment Card Industry Data Security Standard
  • HIPAA - Healthcare information privacy requirements

Creating Custom Rules

Need rules specific to your organization? See the Rule Authoring Guide to create custom validation rules in JSON or TypeScript.

Last updated on