Chapter 29 IDP
Figure 395 Custom Signature Log
29.9 IDP Technical Reference
This section contains some background information on IDP.
Host Intrusions
The goal of
You must install a host IDP directly on the system being protected. It works closely with the operating system, monitoring and intercepting system calls to the kernel or APIs in order to prevent attacks as well as log them.
Disadvantages of host IDPs are that you have to install them on each device (that you want to protect) in your network and due to the necessarily tight integration with the host operating system, future operating system upgrades could cause problems.
Network Intrusions
Snort Signatures
You may want to refer to open source Snort signatures when creating custom ZyWALL ones. Most Snort rules are written in a single line. Snort rules are divided into two logical sections, the rule header and the rule options as shown in the following example:
alert tcp any any
The text up to the first parenthesis is the rule header and the section enclosed in parenthesis contains the rule options. The words before the colons in the rule options section are the option keywords.
| 509 |
ZyWALL USG 100/200 Series User’s Guide | |
|
|