I normally only run snort when I think I've got something going on
*inside* the network. I used to pick and choose just a couple of rule
sets just to see how dirty the other side of my firewall was. It was
fascinating at first.

Now when I have some sort of hint that there might be a bug on the
inside of my network, I turn everything on usually for a couple of
days. I typically find what I'm looking for in the first couple of
hours and resolve it. The most recent was a guest machine infected
with Conficker. Our standard firewall is a core 2 duo with 2gb ram and
an 80gb disk. We hit it heavy with squid, but with all snort rule sets
on it pretty much hard locks the firewall after 3 days. At some point
it goes to 100% cpu and stays there for about 12-18 hours...
eventually it just panics and reboots on its own. If we catch it quick
we can turn snort off and we're good to go.

---------------------------------------------------------------------
To unsubscribe, e-mail: discussion-unsubscr...@pfsense.com
For additional commands, e-mail: discussion-h...@pfsense.com

Commercial support available - https://portal.pfsense.org

Reply via email to