@Stewart:
@sthames42:
@bmeeks:
@sthames42:
Is it possible to log and block a rule without alerting? If so, would this be done by modifying the rule in SID Mgmt so "alert" becomes "log"?
No. This is not possible in Snort. The custom plugin within the Snort binary that inserts the IP address to be blocked into that snort2c table mentioned above triggers on every alert. It does not care what the rule action is. It does not even look at the rule action.
What I would like to happen is for these intrusions, like trying to access port 1433, to not generate an alert but block all access from the IP, not just 1433. In essence, block anyone trying to access my network in a way they should not. Now, this would be redundant if the blocks that snort creates are port specific and I don't know if they are, yet.
Given so many intrusion attempts, the list of alerts is very large and it would be much easier if, after identifying an intrusion, I could not generate an alert, log the attempt, and block the IP. The only option, right now, appears to be to disable the alert. If I suppress the alert, I assume it will not be blocked.
Bill, please let me know if it I appear to be overthinking this.
Steve
I believe that once the IDS alerts and blocks an IP, the IP is blocked completely and not just for the port. It still continues the alerts to show it is still happening, but the IP is completely blocked.
This is correct. Blocking is done by IP address and not by IP address and port. So all ports for the blocked IP are also blocked. It's the equivalent of using any/any for the port numbers in a firewall block rule.
Bill