next up previous contents
Next: IP Addresses Up: Rules Headers Previous: Rule Actions   Contents

Protocols

The next field in a rule is the protocol. There are four protocols that Snort currently analyzes for suspicious behavior - TCP, UDP, ICMP, and IP. In the future there may be more, such as ARP, IGRP, GRE, OSPF, RIP, IPX, etc.



Eugene Misnik 2013-05-08