I would put a machine on the outside with a hub (same subnet as the
firewall's external inteface), and iptables running , so that the machine
will accept all trfic but will respond to none except the machine you are on
(if you use NAT , its probably your firewall) no service should be running
on the machine , the data is ok to lay outside you'r LAN but analyzing it
should be done inside , have snort with mysql  (or any other IDS system)
running on the outside machine and have the data fetched from the inside.

TheOg
Liran Cohen

----- Original Message -----
From: "Naman Latif" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Friday, January 31, 2003 7:34 PM
Subject: Setting up an IDS system


>
> Hi,
> I am in the process of setting up and IDS system using Linux\Snort in
> DMZ. A couple of questions regarding this
>
> 1. Is it a safe practice to have access to this system from Inside
> Network (for retrieving log files etc) from 1-2 Stations ? Ofcourse IDS
> won't have access to inside network and be blocked by Firewall.
>
> 2. What kind of services should be running on IDS Station ? Should all
> Web\FTp etc services be stopped ?
>
> 3. How important it is to also have an IDS system monitoring the traffic
> on your Inside Network ? I believe it won't be a good idea to have the
> SAME DMZ IDS system with another NIC monitoring Inside Network Traffic ?
>
> Any other suggestions OR any Links that I can refer to ?
>
> Regards \\ Naman
>
>

Reply via email to