[Tfug] Snort usage and security precautions
Steven Bowers
steveb7 at bblabs.net
Sun Aug 13 14:55:13 MST 2006
There are passive taps and "receive only" cables that work for this type
of application. Take a look at
http://www.dgonzalez.net/pub/roc/roc.pdf
http://www.snort.org/docs/tap/
While not running in a production environment I do have a passive tap
constructed, using the 2nd article, and in operation. Suits my needs and
seems to provide some good data. Occasionally you will find a true
hardware tap on eBay such as this one:
http://tinyurl.com/fv5ks
Adrian wrote:
> Query: How many people are using Snort in a production environment? Using
> Snort on an internet facing interface?
>
> I keep thinking about deploying Snort as a detection/classification service,
> in addition to may existing firewall logging and periodic manual
> inspection... But it seems like every other week there is a serious security
> hole. Given that, I would hate to have it on my firewall or facing the
> internet in particular, though that is presumably were the "bad stuff" is you
> want to detect.
>
> Adrian
>
> _______________________________________________
> Tucson Free Unix Group - tfug at tfug.org
> Subscription Options:
> http://www.tfug.org/mailman/listinfo/tfug_tfug.org
>
More information about the tfug
mailing list