O'Reilly logo

Configuring IPCop Firewalls by James Eaton-Lee, Barrie Dempster

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Log Analysis Options

Snort, being such a well-used project, has a variety of analysis products available. We will take a quick look at some of the most commonly used products and the features they provide. The IPCop logging system is not entirely adequate for most analysis, and definitely cannot be used to provide reports, which are commonly required whenever there is an intrusion attempt. Many projects have been created in order to analyze and report on these logs. In order to use these tools you may have to configure IPCop to log to a remote syslog server or in some cases you can install and add on to IPCop.

Perl Scripts

One of the easiest install-and-use products for Snort log analysis is the excellent SnortALog. It offers some excellent features, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required