On 17 May 2002 at 14:03, Adam Shephard wrote:

> I suffer from a logic deficiency and I've been tossing an idea around
> in my head. I thought it might be a good idea to run the logic past
> the people here. I have a firewall between my network and the world
> and Snort behind my firewall. That Snort station reports to ARIS. I'm
> toying with the idea of putting another Snort station on the outside
> between my firewall and the world and having it also report to ARIS.
> 
> If I do that, can I reasonably assume that any incidents that show up
> in the outside Snort ARIS logs AND NOT in the firewall logs got
> through the firewall?

It sounds like you're comparing apples with oranges.  The roles of Snort and that of a 
firewall 
logging all dropped packets really are quite different.  Snort will log events such as 
IIS 
direcory traversals which most firewalls will blissfully ignore.  Similarly, a Nimda 
attempt to 
an IP address for which the firewall is dropping incoming web connections will not be 
noticed 
by Snort, but will generate an entry in the firewall log (if all drops are logged).

> Can I also reasonably  assume that, should
> something show up in the outside Snort ARIS logs AND NOT in the
> firewall logs AND NOT in the inside Snort ARIS logs, that the inside
> Snort station is not functioning properly? By not functioning properly
> I mean anything from "bad NIC" to "improper configuration" to "Snort
> sucks".
> 

Not necessarily.  There may be traffic on the firewall's external network segment 
which a 
promiscuously-capturing IDS box would see, but which the firewall's interface would 
not.  Such 
as traffic to other machines outside the firewall.  Traffic to the Snort box's network 
interface (if it is not transparent).  Traffic destined for the firewall itself.

Personally I don't run IDS outside the firewall, I'm only interested in what gets 
through.

Reply via email to