Intrusion Prevention System
Service Description
Snort RulesThe Intrusion Prevention System works based on a set
of rules files which contain all the threats definitions.
The SNORT system provides 3
different set of rules:
The Cloud-Bricks system comes with SNORT preconfigured with
Community rules only. If you want to use the "Registered User Rule set", please Sign
Up at snort.org, get your oink code and contact
our support team. If you want to protect your system with the most updated threat definition rules and receive support for snort, you may become a snort subscriber. Our support team will configure your SNORT system with the Subscriber Rule Set. First time usageIn order to use the SNORBY system, some adjustments must be done
when logging in for the first time. 1- Access the SNORBY interface by navigating to Firewall ->
SNORT I.P.S in the left menu. The default login is "snorby@snorby.org" and the default password is "snorby". 2- The SNORBY dashboard screen appears, please pay attention to the message "The Snorby worker is not currently running" 3- We need to start the Snorby Worker Process, in order to do so, please select the "Worker & Job Queue" option from the "Administration" menu: 4- In the "Worker & Job Queue" page, please select the "Start Worker" option from the "Worker Options" menu. A green "OK" icon will confirm that the worked process has been started: 5- Now its time to configure your email, password and Time Zone: The configuration page will appear when clicking on the "Settings" link in the upper right corner of the screen. 6- Please configure your actual email address and an easy to remember password to access the Snorby interface.
Configuring your Virtual Machine to use the IPS systemIn order to actually make the Intrusion Prevention System to scan
your virtual machine network traffic, you will have to include
some "IPS Filters" in your Firewall rules. What to do in case of attack
|
Contents
• Service Description• Snort Rules• First time usage• Configuring your Virtual Machine to use the IPS system• What to do in case of attack |