Generate New Secure Firewall Recommendations in Snort 3
Generate the Secure Firewall recommendations for the intrusion policy and then follow the steps that are listed here to create new recommended rule settings in Snort 3. Rule overheads are interpreted as security levels based on the threshold policies selected by you in Snort 3. Recommended action is based on the selected security level and if it is higher than the base policy, then the recommendation is not just limited to generating the events.
Prior to setting the Secure Firewall recommendations you should ask which of the three points listed below closely matches the goal:
-
Increased Protection —Enable additional rules based on vulnerabilities found in the host database and do not automatically disable any rules. This will likely result in a larger rule set.
-
Focused Protection—Enable additional rules and disable existing rules based on vulnerabilities found in the host database. This can increase or decrease the number of rules depending on vulnerabilities discovered.
-
Higher Efficiency—Use the currently enabled rule set and disable any rules for vulnerabilities not found in the host database. This will likely result in a smaller enabled rule set.
Based on the response, the recommendation actions are as follows:
-
Set recommendations to the next highest security level, and uncheck the disable rules.
-
Set recommendations to the next highest security level, and check the disable rules.
-
Set recommendations to the current security level, and check the disable rules.
Before you begin
Secure Firewall recommendations have the following requirements:
-
Ensure that hosts are present in the system to generate recommendations.
-
Protected networks configured for recommendations should map to the hosts present in the system
Procedure
Step 1 | Choose . | ||||
Step 2 | Click the Snort 3 Version button of the intrusion policy. | ||||
Step 3 | Click the Recommendations (Not in Use) layer to configure the rule recommendations. Click Start. In the Secure Firewall Rule Recommendations window you can set the following:
| ||||
Step 4 | Generate and apply recommendations:
| ||||
Step 5 | You can verify the recommendations and then choose to apply them accordingly:
|
What to do next
Deploy configuration changes; see Deploy Configuration Changes.