© SANS Institute 200
8
,
Author retains full rights.
© SANS Institute 200
8
, Author retains full rights.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
Network IDS & IPS Deployment Strategies
Now create two bridges. The first bridge is intended to actually filter traffic deemed
malicious or otherwise unwanted, and the second is to verify the filter.
echo "add dc0" >> /etc/bridgename.bridge0
echo "add dc1" >> /etc/bridgename.bridge0
echo "up" >> /etc/bridgename.bridge0
echo "add dc2" >> /etc/bridgename.bridge1
echo "add dc3" >> /etc/bridgename.bridge1
echo "up" >> /etc/bridgename.bridge1
We should now see the following output from these commands:
cat /etc/bridgename.bridge0
add dc0
add dc1
up
cat /etc/bridgename.bridge1
add dc2
add dc3
up
Reboot the system by typing the following command:
reboot
Upon boot completion you should have the packets traveling over both bridges.
Install these packages for convenience:
cd /usr/ports/net/wget
make install