From: Murugavel T. <tmu...@gm...> - 2004-12-11 12:13:38
|
Hi We have implmented snort-inline . For testing purpose we removed all the rules . setup will be like below APC -sytem -------ROUTER--- SNORT-INLINE------ BPC-system WHEN WE TRY TO DO telnet from BPC -system to router snort-inline preventing the telnet session snort-inline is in bridge mode. when we remove the iptables rules it is working fine without any issue. Any suggestion welcome Iptables rules used iptables -t mangle -A FORWARD -p tcp -s xxxx --syn -m state --state NEW -j MARK --set-mark 1 iptables -t mangle -A FORWARD -p tcp -s xxxx -m state --state ESTABLISHED -j MARK --set-mark 2 iptables -A FORWARD -s xxxx -j QUEUE snort.conf file var HOME_NET any var HONEYNET any var EXTERNAL_NET any var DNS_SERVERS $HOME_NET var SMTP_SERVERS $HOME_NET var HTTP_SERVERS $HOME_NET var SQL_SERVERS $HOME_NET var TELNET_SERVERS $HOME_NET var SNMP_SERVERS $HOME_NET var HTTP_PORTS 80 var SHELLCODE_PORTS !80 var ORACLE_PORTS 1521 var AIM_SERVERS [64.12.24.0/23,64.12.28.0/23,64.12.161.0/24,64.12.163.0/24,64.12.200.0/24,205.188.3.0/24,205.188.5.0/24,205.188.7.0/24,205.188.9.0/24,205.188.153.0/24,205.188.179.0/24,205.188.248.0/24] var RULE_PATH /usr/local/rules/rules preprocessor flow: stats_interval 0 hash 2 preprocessor frag2 preprocessor stream4: disable_evasion_alerts preprocessor stream4_reassemble preprocessor http_inspect: global \ iis_unicode_map unicode.map 1252 preprocessor http_inspect_server: server default \ profile all ports { 80 8080 8180 } oversize_dir_length 500 preprocessor rpc_decode: 111 32771 preprocessor bo preprocessor telnet_decode: 23 25 21 119 include classification.config include reference.config #include $RULE_PATH/local.rules #include $RULE_PATH/bad-traffic.rules #include $RULE_PATH/exploit.rules #include $RULE_PATH/scan.rules #include $RULE_PATH/finger.rules #include $RULE_PATH/ftp.rules #include $RULE_PATH/telnet.rules Regards tmv "Success comes to the person who does today" |