From: vishal_nitr <vis...@re...> - 2008-07-30 15:14:21
|
Hi All, I am using Snort_inline-2.6.1.5 and ftester1.0 to test snort IPS. Snort is not able block only web related packets.Actually ftester will use snort rule files to generate packets means it generates packets according to the rules mentioned in rule files. When I use any other rule files like bad-traffic.rules or misc.rules or exploit.rules to generate packets Snort is detecting and dropping them but when I am using web-iis.rules or bleeding-web.rules it is checking those packets but not dropping it.TIA. Thanks and Regards, Vishal Kotalwar, Software Engineer, Aricent, Chennai-35. 09884074047. |