there have been a couple of threads discussing this but so the interest does not get lost.
The current IDS implementation in Astaro 5.x drops individual packets that trip one of the snort traps.
A feature that would allow adding the IP addresses of the source of these tripped packets to a block list would be an excellent feature.
All of these functions are already developed in the GPL project snortsam. It also intelegently handles rollback, whitelists etc etc.
This would be an excellent feature IMHO as from my tests (on another firewall) it reduces the IDS alarm count by 90%+ and reduces logs and CPU load as a consequence
www.snortsam.net
This thread was automatically locked due to age.