You will need 3 interfaces. Two will be in transparent mode and the third will be used for management. When you run Snort in inline mode, you would use, for example: -i eth0:eth1, or the bridge if you will be using a bridge and eth3 for management.
YM
It will be largely dependant on the output plugin you are using. In case of Snorby, although I don't use it, will eventually read from a database; MySQL. In this case, it is a practice to let Snort output to unified2, and let barnyard2 parse unfied2 logs into the database, from which Snorby will read data.
Hope you get your setup done.
YM
a. How are you running Snort? In other words, what is the command you are using to run Snort?
b. Which DAQ are you using?
c. How is your drop rule setup?
d. When you stop Snort, what do the verdict statistics show?
Please when you send/reply do so for the whole group as there are awesome people here that are more experienced than I am, and other people benefit as well.
Thanks.
YM
Have you tried adding --daq-mode inline in your command?
YM
Sorry I overlooked your verdicts:
"Block: 640 ( 0.008%)"
Which means Snort has blocked 640 packets out all the packets Snort analyzed.
I would start testing on more simple rules, like the icmp-protocol ping and then move on to more complex rules.
YM