Skip to main content

Overview

NIDS (Network Intrusion Detection System) is a Meter Security Appliance feature that monitors network traffic for suspicious activity and potential security threats. NIDS operates in two modes: detect-only (IDS) for logging threats, and protect (IPS) for automatically blocking malicious traffic. This enables you to identify and respond to security incidents happening on your network in real time.

Use cases

  • Monitor network traffic for malware, command-and-control communications, and exploit attempts
  • Automatically block known threats before they can compromise devices on your network
  • Meet compliance requirements for network security monitoring and threat detection
  • Detect suspicious behavior patterns in encrypted traffic through metadata analysis
  • Identify compromised devices communicating with malicious external servers
  • Generate security event logs for analysis in your SIEM platform

Prerequisites

  • Meter Security Appliance (mc06 or mc11)
  • NOS version supporting NIDS (contact support for minimum version)
  • Dashboard access with Partner or Admin write permissions
  • At least one configured VLAN to monitor

How NIDS works

Detection engine

NIDS operates locally on your Security Appliance, analyzing network traffic in real time without sending packet data to Meter’s backend. The system uses signature-based detection powered by the Emerging Threats ruleset, which contains thousands of rules for identifying known attack patterns, malware, and suspicious network behavior.

Traffic analysis

For unencrypted traffic (HTTP, DNS, etc.): The Security Appliance inspects both packet payloads and metadata to detect threats such as malware downloads, command-and-control activity, and exploit attempts. This enables deep packet inspection and signature-based threat detection. For encrypted traffic (HTTPS, TLS, etc.): The Security Appliance cannot decrypt encrypted content. Instead, it analyzes metadata and behavioral patterns including:
  • SNI information from TLS handshakes
  • Connection timing, frequency, and destination patterns
  • Packet sizes and flow characteristics
  • Certificate information
Privacy: Meter NIDS never breaks encryption. The contents of your encrypted traffic remain completely private and secure, end to end.

Operating modes

Detect mode (IDS):
  • Monitors traffic and generates event logs when threats are detected
  • No automatic blocking - all traffic continues flowing normally
  • Allows security teams to review threats before taking action
  • Events can be manually converted to persistent firewall rules
Protect mode (IPS):
  • Automatically blocks traffic matching high-severity threat signatures
  • Generates temporary ACL rules to prevent future connections
  • Configurable rule duration (default 24 hours)
  • Includes suppression capabilities for false positives

Traffic scope

North-South traffic (default):
  • Monitors traffic entering or leaving your network through the internet
  • Scans traffic between selected VLANs and external destinations
East-West traffic (optional):
  • Monitors traffic between VLANs within your network
  • Useful for detecting lateral movement from compromised devices
  • Can be enabled per NIDS configuration

Threat categories

NIDS organizes detection rules into categories based on threat type. Each category can be independently configured for detect or protect mode. The complete list of categories and signatures is visible in Dashboard after enabling NIDS (navigate to Firewall > NIDS > Categories or Signatures tabs).

All threat categories

CategoryDescriptionPotentially impacted services
activexActiveX-related exploits and attacksLegacy web applications, Internet Explorer components
adware-pupAdware and potentially unwanted programsBrowser extensions, bundled software installers
attack-responseResponses indicating successful attacksCompromised servers returning attack payloads
bad-unknownGeneric malware and suspicious traffic patternsMalware downloads, compromised device communications
botccBotnet command and control communicationsInfected devices communicating with bot controllers
chatInstant messaging and chat protocolsIRC, instant messaging clients
coinminingCryptocurrency mining trafficMining pool connections, mining software
current-eventsThreats related to current security eventsZero-day exploits, trending attack campaigns
ddosDistributed denial of service attacksNetwork flooding, amplification attacks
decode-errorProtocol decoding errors indicating attacksMalformed packets, protocol abuse
deletedPreviously active rules now deprecatedN/A
dnsDNS-based attacks and tunnelingDNS exfiltration, DNS tunneling, cache poisoning
dosDenial of service attacksNetwork resource exhaustion
dropKnown malicious IP addressesConnections from known bad actors
dshieldDShield listed malicious sourcesTraffic from DShield blocklist IPs
exploitExploit attempts against vulnerabilitiesBuffer overflows, remote code execution
exploit-kitExploit kit delivery mechanismsDrive-by downloads, malicious ad networks
external-ip-checkServices that report public IP addressesIP lookup services (ipinfo.io, whatismyip.com)
ftpFTP-based attacksFTP brute force, FTP bounce attacks
gamesOnline gaming trafficGame client updates, gaming protocols
huntingSuspicious behaviors worth investigatingAnomalous patterns, reconnaissance activity
icmpICMP-based attacksPing floods, ICMP tunneling
icmp-infoInformational ICMP trafficNetwork diagnostics, traceroute
inappropriateInappropriate content accessAdult content, offensive material
infoInformational eventsNon-threatening but notable traffic
malwareKnown malware communicationsCommand and control servers, data exfiltration
miscMiscellaneous detectionsUncategorized security events
mobile-malwareMobile device malwareAndroid/iOS malware, mobile C2
netbiosNetBIOS-based attacksSMB attacks, Windows file sharing exploits
p2pPeer-to-peer file sharingBitTorrent, eDonkey, other P2P protocols
phishingPhishing site connectionsCredential theft attempts, fake login pages
policy-violationOrganizational policy violationsUnauthorized protocols, blocked services
protocol-command-decodeProtocol command decoding issuesCommand injection, protocol abuse
rpcRemote procedure call attacksRPC exploits, DCE/RPC attacks
scadaSCADA/ICS protocol attacksIndustrial control system exploits
scanNetwork scanning and reconnaissancePort scans, vulnerability scans, network mapping
shellcodeShellcode execution attemptsBuffer overflow payloads, RCE attempts
smtpEmail protocol attacksSMTP relay abuse, email injection
snmpSNMP-based attacksSNMP enumeration, community string abuse
sqlSQL injection attacksDatabase exploitation attempts
stream-eventTCP stream anomaliesConnection hijacking, stream manipulation
successful-adminSuccessful administrative accessPrivileged command execution
successful-recon-largescaleLarge-scale reconnaissanceMass scanning, network mapping
successful-recon-limitedLimited reconnaissanceTargeted scanning
successful-userSuccessful user-level accessUser account compromise
suspiciousSuspicious but unconfirmed threatsAnomalous traffic patterns
targetedTargeted attacksAPT activity, spear-phishing
telnetTelnet protocol attacksTelnet brute force, Telnet exploits
tftpTFTP-based attacksTFTP abuse, unauthorized file transfers
torTor network trafficTor entry/exit nodes, hidden services
trojan-activityTrojan command and controlBackdoor communications, RAT activity
unsuccessful-userFailed user access attemptsFailed login attempts, authentication failures
user-agentsSuspicious user agent stringsAutomated tools, malicious bots
voipVoIP protocol attacksSIP attacks, VoIP fraud
web-application-activityWeb application interactionsAPI calls, web application traffic
web-application-attackWeb application exploitsXSS, CSRF, directory traversal
web-clientWeb client vulnerabilitiesBrowser exploits, client-side attacks
web-serverWeb server attacksWeb server exploits, CGI attacks
wormWorm propagation attemptsSelf-replicating malware, network worms
Note: To view the complete list of categories and signatures with real-time updates, enable NIDS and navigate to Firewall > NIDS > Categories or Signatures in Dashboard.

Example signatures

Below are representative signatures from various categories to illustrate the types of threats detected:
Signature IDSignature nameCategorySeverityDescription
2019284ET ATTACK_RESPONSE Output of id command from HTTP serverattack-responseHighDetects successful command execution on compromised web servers
2100498GPL ATTACK_RESPONSE id check returned rootattack-responseHighIdentifies root-level command execution responses
2054168ET INFO External IP Lookup Domain in DNS Lookupexternal-ip-checkHighMonitors connections to IP lookup services like ipinfo.io
2021076ET HUNTING SUSPICIOUS Dotted Quad Host MZ Responsebad-unknownHighDetects suspicious executable downloads via direct IP addresses
2024788ET MALWARE Generic Coinminer Pool ConnectioncoinminingHighIdentifies cryptocurrency mining pool traffic
Note: The ruleset contains thousands of signatures across all categories. To view complete signature details including revision numbers and metadata, enable NIDS and navigate to Firewall > NIDS > Signatures in Dashboard.

Severity levels

Rules are assigned severity levels to indicate threat priority:
  • Critical (1): Immediate threats requiring urgent attention - active attacks, known malware
  • High (2): Significant security concerns - suspicious behavior, policy violations
  • Medium (3): Potentially unwanted activity - information gathering, reconnaissance
  • Low (4): Informational events - unusual but not necessarily malicious traffic
You can configure minimum severity thresholds separately for detect and protect modes. For example, set detect to log Medium+ events while protect only blocks Critical threats.

Performance considerations

Security Appliance models

1G Security Appliance (mc06):
  • No performance impact when NIDS is enabled
  • Suitable for networks with up to 1 Gbps throughput requirements
10G Security Appliance (mc11):
  • Overall throughput limited to under 5 Gbps when NIDS is enabled
  • Consider traffic patterns and peak usage when enabling

Optimization strategies

  • Start with detect mode to understand event volume before enabling protect
  • Monitor only business-critical VLANs initially
  • Use category-level controls to disable detection for known-safe services
  • Apply suppressions for persistent false positives
  • Disable east-west detection if inter-VLAN traffic is considered trusted

Integration with firewall rules

Automatic ACL generation

When protect mode blocks traffic, NIDS automatically creates a temporary ACL rule to prevent future connections from the same source. These rules:
  • Apply to the specific source IP, destination IP, and port combination
  • Expire after the configured duration (default 24 hours)
  • Appear in the Protection tab of the NIDS interface
  • Can be deleted manually if needed

Manual ACL creation

From any detection event in the Detection tab, you can manually create a persistent ACL rule:
  1. Click on the event timestamp to view details
  2. Click Create ACL rule at the bottom of the event details
  3. Edit the rule parameters (IP ranges, ports, direction)
  4. The rule appears in Firewall > ACLs as a permanent rule
ACL rules created from NIDS events are marked with a NIDS icon and link back to the original detection event.

SIEM integration

NIDS events can be exported to your Security Information and Event Management platform for centralized monitoring and analysis. Events are delivered in CloudEvents format via AWS Kinesis Data Streams. Exported event data includes:
  • Source and destination IP addresses and ports
  • Threat signature and category information
  • Severity level and action taken (allowed/blocked)
  • HTTP metadata (hostname, URL, user agent)
  • Flow statistics (packet counts, byte counts)
  • TLS SNI information when available
For configuration details, see SIEM integration technical overview.

Best practices

Initial deployment:
  • Begin with detect mode to baseline normal traffic patterns
  • Monitor events for 1-2 weeks before enabling protect mode
  • Review category-specific event volumes to identify false positives
  • Test protect mode on a single non-critical VLAN first
Ongoing operations:
  • Regularly review detection events for new threat patterns
  • Create permanent ACL rules for confirmed malicious traffic
  • Use suppressions sparingly - prefer category-level adjustments
  • Export events to your SIEM for long-term analysis and correlation
  • Update minimum severity thresholds based on your risk tolerance
Performance management:
  • Monitor Security Appliance CPU and memory utilization
  • Consider disabling east-west detection if not required
  • Exclude trusted internal services using suppressions
  • Review and delete expired IPS rules periodically

Limitations

Current limitations:
  • Cannot inspect encrypted traffic contents (by design for privacy)
  • Uses Emerging Threats ruleset - custom signatures not yet supported
  • IPS rules may persist in Dashboard UI after reboot until manually deleted
  • East-west behavior configurations may require additional tuning for complex network topologies
Not supported:
  • SSL/TLS inspection or man-in-the-middle decryption
  • Custom signature creation
  • Learning mode or behavioral analytics
  • Integration with third-party threat intelligence feeds

Need help?

Contact Support

Can’t find what you’re looking for? Our support team is here to help.
Last updated by Meter Support Engineering on 09/30/2025
I