Chapter 15 Intrusion Detection Systems; Demands; Objectives; Methods - D-Link DFL-900 User Manual

Firewall/vpn router
Hide thumbs Also See for DFL-900:
Table of Contents

Advertisement

Intrusion Detection Systems

15.1 Demands

Although Firewall settings are correct, there may still be some crackers intrude our system. Crackers hack into our system
through Firewall-allowed channels with sophisticated skills. Most often, they attack specific application servers such as SNMP,
Web, and FTP services in your DMZ.

15.2 Objectives

1. Detect any attacks towards our DMZ servers.
2. Instantly notify our network administrators what attacks have been detected.
15.3

Methods

1. Specify where our Web server is located to let the IDS on the DFL-900 focus more on the attacks.
2. Setup logs to email to the specified email address when the log is full. You can also set daily/weekly emails to periodically
monitor the IDS logs.
This chapter introduces Intrusion Detection System (IDS) and explains how to implement it.
Figure 15-1 Some cracker in the Internet would try to hack our company
Intrusion Detection Systems
85
DFL-900 User Manual
Chapter 15

Advertisement

Table of Contents
loading

Table of Contents