Learn how to detect, prevent, and control network traffic using security tools

Business Scenario

You are a cybersecurity analyst at CyberShield Labs, where your task is to monitor and secure the organization’s network from potential threats. You implement Snort in IDS mode to detect suspicious traffic and analyze real-time network activity. Additionally, you configure firewall rules to block ICMP requests and prevent unauthorized network scanning. Through this practical setup, you strengthen network security and ensure safe communication across systems.

Pre-Lab Preparation

Topic : Network Security & Protection

  • Proxy/Proxy Server And VPN  
  • IDS IPS and Firewall

Task 1: Implement Snort in IDS mode on Windows to monitor and detect suspicious traffic

1

Verify Snort Installation

Check folders: C:\Snort

Should contain:

  • bin

  • etc

  • rules

  • Log

2

Edit Snort Configuration File

Go to:

C:\Snort\etc\snort.conf

a

Open in Notepad and update:

b

  • Set HOME_NET (IMPORTANT)

Find:

  1. ipvar HOME_NET any

  1. Replace with your IP range:

  2. ipvar HOME_NET 192.168.x.x/24

3

Open Command Prompt

  • Press Win + R

  • Type cmd

  • Press Enter

Navigate to Root Directory

4

5

Command used:

 Purpose:

  • Move from C:\Users\hp → C:\

Enter Snort Directory

Command:

cd ..
cd ..
cd Snort
cd dir

Navigate to Snort Folder:

 cd C:\Snort

Go to Binary Folder

 cd bin
  • This is where snort.exe is located

Run Interface Listing Command

snort -W

Analyze Output

From your screenshot, Snort displays:

a

b

c

d

Execute Snort Command

6

Command used:

snort -i 4 -A console

 Traffic Monitoring Output

7

Example from your screen:

192.168.0.74:58642 -> 142.250.71.110:443

Meaning:

  • Source: Your system

  • Destination: External server

  • Port 443 → HTTPS traffic

Task 2: Controlling Network Traffic Using Firewall Rules

Aim To block ICMP (ping) requests to prevent network scanning.

Steps1

1

Open Run → wf.msc

a

Step 2 :

2

3

Go to Inbound Rules → New Rule

 Select Custom

Step 4:

4

  • Protocol → ICMPv4

  • Action → Block the connection

Protocol

ICMPv4

Action

 Block  connection

Apply to all profiles Name: Block Ping

5

6

Apply For Outbound Also and Try to ping we you will not able to ping

Great job!
You have successfully learned how to detect, prevent, and control network traffic using security tools.

In this lab, you have:
Understood the importance of
network security, Learned about traffic monitoring techniques, Used security tools to detect suspicious activity, Applied methods to prevent unauthorized access, Configured basic traffic control measures, Tested and analyzed network security settings.

You are now ready to move to the next stage of network security and advanced protection concepts.

Checkpoint

Next-Lab Preparation

   Git Push

Topic :Operating System Fundamentals

1.Basics of Operating Systems

2.Windows OS fundamentals

Learn how to detect, prevent, and control network traffic using security tools

By Content ITV

Learn how to detect, prevent, and control network traffic using security tools

  • 9