
4
©
SOLIDA SYSTEMS INTERNATIONAL 2017
1. Introduction
This manual contains instructions for how to configure and use the following Solida Systems
network security appliances:
SL-2000
Dual 1 Gigabit Ethernet ports
SL-4000
Quad 1 Gigabit Ethernet ports
SL-6000
Dual 10 Gigabit Ethernet ports
The SL-2000, SL-4000 and SL-6000 appliances represent the latest in network security
technology. They combine functionality that would otherwise require several different devices.
These intrusion detection and prevention systems offer reputation based detection, intrusion
detection and prevention, network traffic monitoring and packet logging.
The next sections will describe what some of these features mean for your network.
1.1 Reputation Based Detection and Prevention
Solida Systems provides reputational threat intelligence in the form of a data feed hosted in the
cloud. This threat feed is updated hourly and includes malicious URLs, domain names and IP
addresses. These are harvested from various international threat intelligence sources.
The threat feed includes information about current threats such as ransomware, phishing sites,
trojans and many other threat categories.
1.2 Intrusion Detection and Prevention
Intrusion detection and prevention is implemented through a rule engine and deep packet
inspection (DPI). Solida Systems provides pre-defined rules and rule sets through the cloud
based threat feed. A simple and intuitive configuration page is provided for users interested in
writing custom rules.
1.3 Monitoring and Logging
Tools are available to facilitate monitoring and evidence collection. Logs and evidence files are
written in PCAP format and are compatible with most industry standard analysis tools.