I/INTRO
Pfsense use snort as IPS( Snort Used by fortune 500 companies and goverments Snort is the most widely deployed IDS/IPS technology worldwide. It features rules based logging and can perform content searching/matching in addition to being used to detect a variety of other attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, and much more. )
II/INSTALL
In This lab we need setup network with info:
Wan Interface:192.168.20.203
Lan Interface:172.16.1.1
STEP 1:Install pfsense as ip
STEP 2:Install snort(The package is available to install from System > Packages and you must only install SNORT or SNORT_DEV never both. It is strongly suggested you get a paid subscription form www.snort.org in order for you to download the latest rules. )
STEP 3:After Install done We configure snort(Services > Snort)click tab Setting and configure as image
Notes:
Block offenders:Pfsense will automatically block hosts that generate a snort alert
Remove blocked hosts every: It Will auto remove hosts from tab blocked
Oinkmaster code:you need register 1 Account in Snort or buy (http://www.snort.org/vrt/buy-a-subscription/ will get the the latest rule updates 30 days faster than registered users)
Step 4:click tab update rules(please waith about 4-10 minutes)
Step 5:Test before attack(ping external ip)
Step 6:user super scan tool scan ip external and check tab blocked
Step 7 :access agian ip external
Step 8:Delete ip attacker in tab blocked and test again
Beside You can use Blocking Skype ,Yahoo ,P2P.... with pfSense and Snort.I will intro later
Monday, November 9, 2009
Subscribe to:
Post Comments (Atom)
Hello..
ReplyDeleteI/We (my group) have a project going on at school right now, which basically is to set up an IDS and IPS on a server, and try playing a bit with metasploit.
ATM we are stucked about the fact that the "Blocked list" might not update right after an attack has been performed (in out case ICMP is used as well).
Somewhere we have read that this might be a generel time limit, which takes 5-10 minutes to update the blocked section.
Our question is of course whether you have occured this problem at your way during the process.
Thanks'
The Suspicious-wondering-team
Hello..
ReplyDeleteI/We (my group) have a project going on at school right now, which basically is to set up an IDS and IPS on a server, and try playing a bit with metasploit.
ATM we are stucked about the fact that the "Blocked list" might not update right after an attack has been performed (in out case ICMP is used as well).
Somewhere we have read that this might be a generel time limit, which takes 5-10 minutes to update the blocked section.
Our question is of course whether you have occured this problem at your way during the process.
Thanks'
The Suspicious-wondering-team
grt
ReplyDelete