<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://wiki.wfilterngf.com/skins/common/feed.css?303"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://wiki.wfilterngf.com/index.php?action=history&amp;feed=atom&amp;title=IPS</id>
		<title>IPS - Revision history</title>
		<link rel="self" type="application/atom+xml" href="http://wiki.wfilterngf.com/index.php?action=history&amp;feed=atom&amp;title=IPS"/>
		<link rel="alternate" type="text/html" href="http://wiki.wfilterngf.com/index.php?title=IPS&amp;action=history"/>
		<updated>2026-04-05T21:22:28Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.19.14+dfsg-1</generator>

	<entry>
		<id>http://wiki.wfilterngf.com/index.php?title=IPS&amp;diff=972&amp;oldid=prev</id>
		<title>WFilter: Created page with &quot;{{DISPLAYTITLE:IPS Protection}} == IPS Protection ==  IPS(intrusion prevention system) can detect and block attacks from WAN or LAN subnets. This module is built on the Snort ...&quot;</title>
		<link rel="alternate" type="text/html" href="http://wiki.wfilterngf.com/index.php?title=IPS&amp;diff=972&amp;oldid=prev"/>
				<updated>2019-10-18T08:53:43Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;{{DISPLAYTITLE:IPS Protection}} == IPS Protection ==  IPS(intrusion prevention system) can detect and block attacks from WAN or LAN subnets. This module is built on the Snort ...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{DISPLAYTITLE:IPS Protection}}&lt;br /&gt;
== IPS Protection ==&lt;br /&gt;
&lt;br /&gt;
IPS(intrusion prevention system) can detect and block attacks from WAN or LAN subnets. This module is built on the Snort project.&lt;br /&gt;
&lt;br /&gt;
== Settings ==&lt;br /&gt;
&lt;br /&gt;
* Interfaces： Packets on the selected interfaces will be analysed and matched against the snort IDS engine. By &amp;quot;automatic&amp;quot;, all LAN interfaces will be selected.&lt;br /&gt;
* WAN Attacks: setup the policy on attacks from internet.&lt;br /&gt;
* LAN Attacks: setup the policy on attacks from LAN subnets.&lt;br /&gt;
** Record only, only record the attacks events.&lt;br /&gt;
** Record and block ip, record the attack events and block the source ip for a period.&lt;br /&gt;
** Ignore, no action on attacks.&lt;br /&gt;
* Add Alert Event: whether to add attacks events to the &amp;quot;Event&amp;quot; module.&lt;br /&gt;
* Variables: Variables for LAN subnets and ports to be protected. By &amp;quot;automatic&amp;quot;, all LAN subnets and common ports will be choosen.&lt;br /&gt;
* Rule Set: Define the rules set for detection. &lt;br /&gt;
* IP Whitelist: whitelisted traffic won't be checked. Syntax: 192.168.1.20，192.168.1.20/24.&lt;br /&gt;
&lt;br /&gt;
[[File:ips_settings.png|900px]]&lt;br /&gt;
&lt;br /&gt;
== Variables ==&lt;br /&gt;
&lt;br /&gt;
Choose &amp;quot;Customize&amp;quot; and click &amp;quot;Edit&amp;quot;, you will be able to configure the &amp;quot;Variables&amp;quot;. By &amp;quot;automatic&amp;quot;, all LAN subnets and common ports will be choosen. If you want to protect local servers, please add the local servers ip addresses and ports.&lt;br /&gt;
&lt;br /&gt;
=== IP Variables ===&lt;br /&gt;
&lt;br /&gt;
* Define ip variables for subnets and severs to be protected. You may check snort documents for more details.&lt;br /&gt;
** HOME_NET: local LAN subnets to be protected, default is all LAN subnets.&lt;br /&gt;
** EXTERNAL_NET: external networks, default is &amp;quot;any&amp;quot;.&lt;br /&gt;
** DNS_SERVERS: DNS servers to be protected, default is $HOME_NET.&lt;br /&gt;
** SMTP_SERVERS: SMTP servers to be protected, default is $HOME_NET.&lt;br /&gt;
** HTTP_SERVERS: HTTP web servers to be protected, default is $HOME_NET.&lt;br /&gt;
** SQL_SERVERS: database servers to be protected, default is $HOME_NET.&lt;br /&gt;
** TELNET_SERVERS: telnet servers to be protected, default is $HOME_NET.&lt;br /&gt;
** SSH_SERVERS: ssh servers to be protected, default is $HOME_NET.&lt;br /&gt;
** FTP_SERVERS: FTP servers to be protected, default is $HOME_NET.&lt;br /&gt;
** SIP_SERVERS: SIP servers to be protected, default is $HOME_NET.&lt;br /&gt;
* Syntax(same as snort):&lt;br /&gt;
** Single IP or subnet: 192.168.10.0/24&lt;br /&gt;
** Multiple IP or subnets:[192.168.10.0/24,192.168.20.0/24]&lt;br /&gt;
** ! for exception:[192.168.10.0/24,!192.168.10.100]&lt;br /&gt;
* '''Please note: server ip addresses shall be LAN ip addresses, not public IP addresses.'''&lt;br /&gt;
&lt;br /&gt;
[[File:ips_ipvar.png|800px]]&lt;br /&gt;
&lt;br /&gt;
=== Port Variables ===&lt;br /&gt;
* Ports to be protected. You may check snort documents for more details.&lt;br /&gt;
** HTTP_PORTS: default is [36,80,81,82,83,84,85,86,87,88,89,90,311,383,555,591,593,631,801,808,818,901,972,1158,1220,1414,1533,1741,1812,1830,1942,2231,2301,2381,2578,2809,2980,3029,3037,3057,3128,3443,3702,4000,4343,4848,5000,5117,5250,5450,5600,5814,6080,6173,6988,7000,7001,7005,7071,7144,7145,7510,7770,7777,7778,7779,8000,8001,8008,8014,8015,8020,8028,8040,8080,8081,8082,8085,8088,8090,8118,8123,8180,8181,8182,8222,8243,8280,8300,8333,8344,8400,8443,8500,8509,8787,8800,8888,8899,8983,9000,9002,9060,9080,9090,9091,9111,9290,9443,9447,9710,9788,9999,10000,11371,12601,13014,15489,19980,29991,33300,34412,34443,34444,40007,41080,44449,50000,50002,51423,53331,55252,55555,56712]&lt;br /&gt;
** SHELLCODE_PORTS: shellcode port, default is &amp;quot;!80&amp;quot;(all ports except 80)&lt;br /&gt;
** ORACLE_PORTS: oracle port, default is &amp;quot;1024:&amp;quot;(1024:65534)&lt;br /&gt;
** SSH_PORTS: ssh ports, default is &amp;quot;22&amp;quot;.&lt;br /&gt;
** FTP_PORTS: FTP ports, default is &amp;quot;[21,2100,3535]&amp;quot;.&lt;br /&gt;
** SIP_PORTS: SIP ports, default is &amp;quot;[5060,5061,5600]&amp;quot;.&lt;br /&gt;
** FILE_DATA_PORTS： file tranfer ports, default is &amp;quot;[$HTTP_PORTS,110,143]&amp;quot;.&lt;br /&gt;
* Syntax:&lt;br /&gt;
** Single port, eg: 80&lt;br /&gt;
** Multiple ports, eg:[80,8000,8080]&lt;br /&gt;
** Port range, eg: 1024:2048&lt;br /&gt;
** ! for exception, eg: [1024:2048,!2000]&lt;br /&gt;
* '''Note: ports shall be LAN ports, not the forwarded WAN ports.'''&lt;br /&gt;
&lt;br /&gt;
[[File:ips_portvar.png|800px]]&lt;br /&gt;
&lt;br /&gt;
== Rule Set ==&lt;br /&gt;
&lt;br /&gt;
Define the rules set for detection. Pre-defined rule sets:&lt;br /&gt;
&lt;br /&gt;
* Indicator: detect local compromised clients.&lt;br /&gt;
* Malware: inbound and outbound malware attacks.&lt;br /&gt;
* Server: attacks to local services.&lt;br /&gt;
* System: attacks to local operation systems./li&amp;gt;&lt;br /&gt;
* Protocol: attacks to protocols.&lt;br /&gt;
&lt;br /&gt;
To protect local client devices, please enable &amp;quot;Indicator&amp;quot; and &amp;quot;Malware&amp;quot; rule sets. To protect local servers, please enable &amp;quot;Server&amp;quot;, &amp;quot;System&amp;quot; and &amp;quot;Protocol&amp;quot; rule sets.&lt;br /&gt;
&lt;br /&gt;
[[File:ips_ruleset01.png|800px]]&lt;br /&gt;
&lt;br /&gt;
IPS Settings, by default, only recommened rules are enabled.&lt;br /&gt;
* &amp;quot;High&amp;quot; means high priority rules, like attempted-admin, shellcode-detect, trojan-activity...&lt;br /&gt;
* &amp;quot;Medium&amp;quot; includes actions less harmful, like attempted-dos, non-standard-protocol, suspicious-login...&lt;br /&gt;
* &amp;quot;Low&amp;quot; means actions might be harmful, like network-scan, protocol-command-decode...&lt;br /&gt;
&lt;br /&gt;
[[File:ips_ruleset02.png|800px]]&lt;br /&gt;
&lt;br /&gt;
Click each ruleset name, you can check the rules amount and detailed rules.&lt;br /&gt;
&lt;br /&gt;
[[File:ips_ruleset03.png|800px]]&lt;br /&gt;
&lt;br /&gt;
[[File:ips_ruleset04.png|800px]]&lt;br /&gt;
&lt;br /&gt;
== Custom Rules ==&lt;br /&gt;
&lt;br /&gt;
Besides of the system rulesets, you also can define custom rules. The syntax is same as snort:&lt;br /&gt;
&lt;br /&gt;
[[File:ips_localrule.png|900px]]&lt;br /&gt;
&lt;br /&gt;
== History ==&lt;br /&gt;
&lt;br /&gt;
Query history records of attack events, including ip addresses, ports, type and messages.&lt;br /&gt;
&lt;br /&gt;
[[File:ips_query.png|900px]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]]&lt;/div&gt;</summary>
		<author><name>WFilter</name></author>	</entry>

	</feed>