Hi,
At 11:39 10/09/00 -0700, Aaron Schultz wrote:
>The only experience I've had with the IDS/firewall working together was
>with the company "ZoneOfTrust.com".  Their system seemed to be able to
>watch a high-volume website and actually catch items which appeared to be
>attacks and add the appropriate firewall rules.

How do the add the rules? which filters do they suppport?
was it "well done"?

>   I've not seen this style
>of functionality in ipchains yet, although it's able to be manipulated by
>programs like portsentry to provide some level of stopping attacks
>realtime.

I think the problem here is that both softwre families grow independently, 
which
makes writing tools in one for the other somewhat hard. Also, there is a trust
problem: to make sure your filter is getting the right "order", some secure
communication between the two is necessary.


cheers,
mouss

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to