-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IPS: snort basic implementation #891
Comments
Testing image: 23.05.5-ns.1.3.0-140-gc034f31f |
Test Case 1: Verify Snort 3 Setup
Test Case 2: Verify Rule Policies
Test Case 3: Verify Oinkcode Configuration
Test Case 4: Verify Bypass Rules
Test Case 5: Verify Disable Rules
Test Case 6: Verify Suppress Rules
Test Case 7: Verify Alerts and Logs
Test Case 8: Verify Disable and Stop IPS
|
Test case 1 :(security policy): OK
Test Case 2 (balanced policy) : ok
The number of rules has decreased compared to the previous case. Test Case 3 (oinkcode) : OK
|
Test case 4 (bypass src)
Said that, the snort restart may be be avoided in cases like this, where only nft rules are involved. |
Test Case 5: Verify Disable Rules : OK |
Test case 7 verified:
Test case 8 verified. |
Test case 6 verified using testing rules: Before the suppress configuration, an alert for a PING is found inside the log:
Added the suppression:
Verify the configuration:
Another ping does not produce any alert. |
Released on 23.05.5-ns.1.4.0 |
Add the IPS (Intrusion Prevention System) feature to prevent and mitigate attacks.
Proposed solution:
Implement command-line configuration for Snort.
Main features:
The module will provide no UI inside the first release.
The text was updated successfully, but these errors were encountered: