O'Reilly logo

Configuring IPCop Firewalls by James Eaton-Lee, Barrie Dempster

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Monitoring the Logs

An intrusion detection system on its own isn't any good whatsoever; it needs a set of eyes to look over the logs and take action or some sort of automated notification system. IPCop's web interface provides a primitive first look at what is going on in the network.

This can be found under the Logs IDS Logs menu option as shown in the following figure:

Monitoring the Logs

The log screen defaults to today's date and gives us some interesting information. Today on December 20th 381 rules were activated, meaning that Snort noticed 381 possible attacks on the network. This number is abnormally high as the data was generated artificially by the author, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required