That would work for my home setup great, but I don't/can't run NAT on
the box that this must be done on...it's in a "Security Lab" for RIT,
where students in a class will be "hacking" into machines other students
set up...and all this machine will be doing is watching everything that
goes on.

Thanks!
--Brian

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]] On Behalf Of nate
Sent: Friday, December 06, 2002 1:35 AM
To: [EMAIL PROTECTED]
Subject: Re: IPFW & Snort


Brian McCann said:
> Simple question for you all...but it evades me.  I'm trying to setup a

> box that will monitor a network, but be totally invisible to that 
> network, but it needs an IP since it will be using some programs like 
> BigBrother and whatnot.  So...my question is...if I use IPFW to block,

> for example, all ports and effectively totally blocking TCP/IP, will 
> Snort still be able to capture TCP/IP packets?  Has anyone tried/done 
> this?

I reccomend just using 3 NIC interfaces. run 2 of em in bridged mode,
e.g. my home network is protected by a freebsd box running 4 NICs, 1
management(inside internal firewall), NICs 2 and 3 are bridging, NIC 2
is the firewall, NIC 3 is snort, NIC 4 is not being used. this way since
all traffic goes accross 2 interfaces I can run snort on the "internal"
one so it has no chance of detecting what is dropped on the "external"
one. then behind that machine I have another machine doing the NAT.

works great.

nate




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-questions" in the body of the message


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-questions" in the body of the message

Reply via email to