Skip to main content

Create and Use Network Blocks

This topic describes Network Blocks and their purpose, and provides instructions for setting them up and using them.


If all you need to know is what enrichment fields Cloud SIEM adds to Records that contain IP addresses in Network Blocks, you can jump to Network Blocks and enrichment fields below.

In Cloud SIEM, a Network Block is a CIDR block of IP addresses from your infrastructure that you label to provide context that can be leveraged in rules and is helpful in investigating Insights. For example, you could label one Network Block “Server Network” and another one “Workstations”.

In addition to labeling a Network Block, you can optionally mark a Network Block as “Internal”.


There is another way that IP addresses get marked as “Internal”. Cloud SIEM automatically marks RFC 1918 IP addresses, which aren’t routable on the Internet, as “Internal”.

When you configure a Network Block, there is an option to suppress Signals on the IP addresses within the block.


IP addresses in a Network Block for which Signals are suppressed will not appear on the Suppressed Entities page in the Cloud SIEM UI. (You can’t manually unsuppress Signals for an IP address that are suppressed due to its Network Block configuration.)

Best practices for Network Blocks

As you configure Network Blocks, keep in mind the following considerations.

Ideally, you should use Network Blocks to represent your topology both broadly and thoroughly. Any network address space that is in use should be accounted for at some level of detail. Broad descriptions of supernets that cover all allocated addresses are a start. Coupling a broad view with a detailed inventory is preferable. If you have address space that’s in use but not reflected in your Network Block configuration, associated traffic won’t be evaluated by rules, and problems might not be detected.

It’s good to define Network Blocks at both high and detailed levels. For example, you might want to define one high level block for your corporate network and another for your partner network, and also smaller, more detailed subnets within each. Nesting your Network Blocks provides more context. For critical assets that are static over time, it can even be useful to include /32 addresses. 

Keep the labels you assign to Network Blocks short and sweet. Don’t include the CIDR block itself in the label. For example, instead of “Seattle Office” for a label, use “Seattle Office”.

Overlapping Network Blocks

In the case that the two or more Network Blocks overlap, Cloud SIEM uses the smallest, most-specific block that matches the IP address that's being looked up. For example, given these two Network Blocks:

  • with Label "EC2 Internal"
  • with Label "WebServer IPs"

When Cloud SIEM looks for the Network Block address, it will return the more-specific block, "WebServer IPs".

Overlapping network blocks

Create a Network Block manually

Follow these instructions to create a Network Block using the Cloud SIEM UI. For information about creating multiple Network Blocks by file upload, see Upload a CSV file of Network Blocks.

  1. In the top menu select Content > Network Blocks.
  2. On the Create Network Block popup:
    1. Address Block. Enter a CIDR block that identifies a contiguous range of IP addresses.
    2. Label. Enter a meaningful name for the Network Block.
    3. Internal. Leave the toggle switched to the right (green) if you want to mark IP addresses that match the network block as Internal. This allows you to filter on the IP addresses in rule expressions, as described below in Using enrichment fields, below.
    4. Suppress Signals. Leave the toggle switched to the left (red) if you do not want to suppress Signals on IP addresses in the Network Block. Otherwise, switch the toggle to the right (green).
    5. Click Create.
      Create network block

Upload a CSV file of Network Blocks

You can define multiple Network Blocks in a .csv file and upload the file to Cloud SIEM.

The table below defines the fields you can import for a Network Block.

address_blockThe IP address and subnet mask of the network block. For example:
label(Optional) A label of the network block (e.g. PCI network). If the label contains a comma, enclose it in double quotes (“).
internal(Optional) When true, all IPs matching this network block in the records will be marked as internal.
Default: true
suppresses_signals(Optional) When true, all Signals for IPs in this network block will be suppressed, so that Insights are not generated based on those Signals.
Default: false

Here is an example of a file in which all fields are supplied:

address_block,label,internal,suppresses_signals,”Internal Block”,true,false

Here is an example of a file in which only the required field, address_block, is specified:


Network Blocks and enrichment fields

The Label you assign to a Network Block is stored in an enrichment field that Cloud SIEM adds to each Record that contains an IP address in that block. Similarly, an enrichment field is added to each Record that contains an IP address in a Network Block that is marked Internal. 

In the table below, the left column contains schema fields that contain IP addresses. The middle column contains the enrichment fields that are added to Records based on Network Block configuration. The enrichment fields in the middle column, which end in _location, are populated with the Label from a Network Block. Those in the rightmost column, which end in _isInternal, are populated with “yes”, indicating that the IP address is in a Network Block marked Internal. 

IP address field_location enrichment field_isInternal enrichment field
srcDevice_ip srcDevice_ip_locationsrcDevice_ip_isInternal

The screenshot below shows a Record that contains several Network Block-related enrichment fields. Note that:

  • dstDevice_ip_isInternal and srcDevice_ip_isInternal indicate that the dstDevice_ip and srcDevice_ip are both in Network Blocks that are marked Internal.
  • srcDevice_ip_location indicates that srcDevice_ip is in the “test_internal” Network Block.

Using enrichment fields

You can use the *_location and *_isInternal fields the same way you do other Record fields. You can use them to filter Records in rule expressions or in searches. 

Privacy Statement
Terms of Use

Copyright © 2024 by Sumo Logic, Inc.