Chapter 24 Intrusion Detection Systems; Demands; Objectives; Methods - D-Link DFL-900 User Manual

D-link dfl-900; dfl-1500 vpn/firewall router
Hide thumbs Also See for DFL-900:
Table of Contents

Advertisement

DFL-900/1500 User Manual

24.1 Demands

Even though we have already configured the firewall rules, it is still not enough. Crackers may hack into our system through
Firewall-allowed channels with sophisticated skills. Most often, they attack specific application servers such as SNMP, Web,
and FTP services in your DMZ.

24.2 Objectives

1.
Detect any attacks towards our DMZ servers.
2.
Instantly notify our network administrators what attacks have been detected.
24.3

Methods

1.
Specify where our Web server is located to let the IDS on the DFL-1500 focus more on the attacks.
2.
Setup logs to email to the specified email address when the log is full. You can also set daily/weekly emails to periodically
monitor the IDS logs.
This chapter introduces Intrusion Detection System (IDS) and explains how to implement it.
Figure 24-1 Some cracker in the Internet would try to hack our company
Intrusion Detection Systems
203
Chapter 24
Intrusion Detection Systems
Chapter 24

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dfl-1500

Table of Contents