Security

Configuring Snort as a Firewall on Windows 7 Environment

Free registration required

Executive Summary

Nowadays, computer networks play an important role in the people daily live, and the widely use of computer networks are for accessing the internet. The network administrator has a full ability to control all access types to network, and tasked to allow or discard some of the connections. By using Snort Intrusion Detection System (IDS), the network administrator can monitor network access from the sender to the receiver. Snort is one of the IDS, and it is difficult to configure it with closed source operating systems for the purpose of accessing and terminating connections. Moreover, it needs more requirements to work with windows operating system.

  • Format: PDF
  • Size: 826.2 KB