Configuring SNORT configuration and rules

Use SNORT Configuration and Rules to configure the integrated SNORT system to process packets according to specific configuration contents and rules on your Network IPS appliance.

About this task

SNORT is an open source intrusion prevention and detection system that is integrated into the Network IPS appliance. The integrated SNORT system on the appliance includes three sections: command-line functions, configuration contents, and rules.
Section Description
Command-line Enables the SNORT engine to run and dictates command-line options such as rule order processing, expressions, and packet capture features.
Configuration contents Includes configuration contents and the configuration file that contains variable definitions, preprocessors, output modules, and other objects to control operations. This piece also contains a rule profiling option.
Rules Includes the rule files and lists the SNORT rules that are designed to protect the vulnerabilities on the network.

Use the information to configure and manage the integrated SNORT system on the Network IPS appliance. For the latest information about SNORT, including rules, documentation, and community forums, go to http://www.snort.org.