[Tfug] Snort usage and security precautions

Steven Bowers steveb7 at bblabs.net
Sun Aug 13 14:55:13 MST 2006


There are passive taps and "receive only" cables that work for this type 
of application. Take a look at

http://www.dgonzalez.net/pub/roc/roc.pdf
http://www.snort.org/docs/tap/

While not running in a production environment I do have a passive tap 
constructed, using the 2nd article, and in operation. Suits my needs and 
seems to provide some good data. Occasionally you will find a true 
hardware tap on eBay such as this one:

http://tinyurl.com/fv5ks

Adrian wrote:
> Query: How many people are using Snort in a production environment? Using 
> Snort on an internet facing interface?
> 
> I keep thinking about deploying Snort as a detection/classification service, 
> in addition to may existing firewall logging and periodic manual 
> inspection... But it seems like every other week there is a serious security 
> hole. Given that, I would hate to have it on my firewall or facing the 
> internet in particular, though that is presumably were the "bad stuff" is you 
> want to detect.
> 
> Adrian
> 
> _______________________________________________
> Tucson Free Unix Group - tfug at tfug.org
> Subscription Options:
> http://www.tfug.org/mailman/listinfo/tfug_tfug.org
> 





More information about the tfug mailing list