IDS mailing list archives
Re: Network hardware IPS
From: "cheong frank" <chocobofrank () hotmail com>
Date: Fri, 03 Oct 2003 10:55:39 +0800
Dear all, What about fortinet ? (http://www.fortinet.com/) which is a integrated IDP, Firewall and Antivirus appliance. Also what about prelude IDS ? (http://www.prelude-ids.org/) it seems like a good product which quite a lot of ppl recommend with a good architecture. Sorry as I don't fully understand what is it "inline" IDP and so I may not be right on recoomending the above product. While I am also considering in deploying an IDS or IDP on our network and is also doing prelimiary stage evaluation. Glad if anyone point me to the right direction. Frank
From: Darren Bolding <darren () faucet net> To: travis.alexander () lacamas org CC: jotero () SMARTEKH com, alvin.wong () b2b com my,focus-ids () securityfocus com Subject: Re: Network hardware IPS Date: Wed, 1 Oct 2003 22:21:50 +0000 Travis, My company recently evaluated a couple of IDS/IDP(etc) products, and decided to implement the Netscreen IDP's. We deployed them in multiple locations and have been quite happy. During testing, I ran various tests against the IDP's and a few other vendors products. In particular, I used Nessus as a typical baseline. An example test was to place my collection of desktops and non-production servers behind an IDP-100 in bridge mode. I then enabled the IDP to drop packets (I also experimented with sending RST's as appropriate) and went about normal use for a week or so. No problems (and this was dropping all critical and "high" importance attacks) were experienced by myself or others using the servers. Then, I ran Nessus against the servers without the IDP dropping packets, and with it dropping packets (attacks). In the first case (no blocking) given that I had set things up intentionally insecure, Nessus found ~75 vulnerabilities. Then I turned packet/attack dropping on and re-ran the test. That test revealed something like 8 "vulnerabilities" which were all of the vaguest sort- "Your running a webserver/ftp server", "You have IIS running, thats bad!" etc. No real attacks. I know that Nessus and other scanners don't by any means include the universe of attacks- but it was a decent baseline in my view. A comparison to a major routing vendors IDS that we tested was favorable to Netscreen. While both systems detected the attacks, when in "protect" mode, the major vendor would issue shun/block commands to a firewall- Nessus found a number more vulnerabilities in that case. A system that controls other systems has to react to what it sees- that makes it hard, if not impossible, to catch that first packet. There are plenty of single-packet vulnerabilities out there. The logging is excellent, the gui is very nice, and the attack database was better than other products I had seen (handy links to Bugtraq/CVE id's). As a customer, support has been fast and effective- and yes, there have been issues that required support. If you aren't a UNIX person, these may be more significant. To me, they were more "duh, I should have known that" issues. Updates are every Thursday (and emergencies) and seem to be informative. We run a lot of protocols on non-standard ports, and can charachterize inoccent traffic fairly well in certain areas. The ability to apply signatures to non-standard ports, and to write custom signatures is significant. Perhaps the most useful feature I found was the highly context sensitive signatures- I can write signatures that check for a particular string in an ftp username for example. Since the rules are ordered, and can be terminal or non-terminal, that makes it possible to alarm on any userid except for a specific one (just an example, we don't do this). All in all, the product was good, and the support has been great. I value the sales/SE experience and find that it frequently corelates with how seriously a company will support you. Other than the dearth of swag, the Netscreen SE and reseller were excellent. I suspect you would get the same SE given your location. So, yes, we're quite happy with it, both in testing and in production. --D On Mon, Sep 29, 2003 at 12:55:47PM -0700, travis.alexander () lacamas org wrote: > Has anyone had any personal experience with the NetScreen IDP products? Does > it live up the hype that is stated on their website? Does it truly work that > way they say? Thanks in advance for replies. > > Travis Alexander > Network Administrator > Lacamas Community Credit Union > 360-834-3611 > http://www.lacamas.org > > -----Original Message----- > From: JAVIER OTERO [mailto:jotero () SMARTEKH com] > Sent: Monday, September 29, 2003 9:02 AM > To: Alvin Wong; focus-ids () securityfocus com > Subject: RE: Network hardware IPS > > > Netscreen IDP is a good product, uses 8 mechanisms for detect, 3 models, > small, medium and large, 3 active modes plu 1 passive (like IDS) > > Ing. Fco. Javier Otero De Alba > Diplomado en Seguridad Inform?tica ITESM CEM > Grupo Smartekh > Antivirus Expertos > Bussiness Continuity > Inftegrity > 5243-4782 al 84 Ext.300 > M?xico, D.F. > > > > -----Mensaje original----- > De: Alvin Wong [mailto:alvin.wong () b2b com my] > Enviado el: Lunes, 29 de Septiembre de 2003 03:31 a.m. > Para: focus-ids () securityfocus com > Asunto: Network hardware IPS > > > Hi, > > I'm interested to find out if anyone can share their experiences or > recommend a network hardware IPS that is deployed in front of the > gateway which is able to detect attack signatures and at the same time, > actively blocking out these attacks, alerting me in the process. > > This would be different from a passive IDS which depends on correlating > the logs every time an alert pops up. An ideal solution would be to be > able to detect the patterns and prevent them automatically, can a > network IPS do this? > > I understand that it is possible in some IDS to do a TCP reset after one > had confirmed that the connection is not acceptable, can anyone explain > whether an IDS that can do this be actually "active" as opposed to > passive? > > It would also be interesting if there could be some amount of trend > analysis built in which can review the destination/source ip traffic > over time, which can be used to identify particular boxes which are > easily targeted, which would mean that more work needs to be done for > that box. > > Regards, > Alvin > > > > --------------------------------------------------------------------------- > Captus Networks IPS 4000 > Intrusion Prevention and Traffic Shaping Technology to: > - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans > - Automatically Control P2P, IM and Spam Traffic > - Precisely Define and Implement Network Security & Performance Policies > FREE Vulnerability Assessment Toolkit - WhitePapers - Live Demo > http://www.securityfocus.com/sponsor/CaptusNetworks_focus-ids_000101 > --------------------------------------------------------------------------- > > > --------------------------------------------------------------------------- > Captus Networks IPS 4000 > Intrusion Prevention and Traffic Shaping Technology to: > - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans > - Automatically Control P2P, IM and Spam Traffic > - Precisely Define and Implement Network Security & Performance Policies > FREE Vulnerability Assessment Toolkit - WhitePapers - Live Demo > http://www.securityfocus.com/sponsor/CaptusNetworks_focus-ids_000101 > --------------------------------------------------------------------------- > > --------------------------------------------------------------------------- > Captus Networks IPS 4000 > Intrusion Prevention and Traffic Shaping Technology to: > - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans > - Automatically Control P2P, IM and Spam Traffic > - Precisely Define and Implement Network Security & Performance Policies > FREE Vulnerability Assessment Toolkit - WhitePapers - Live Demo > http://www.securityfocus.com/sponsor/CaptusNetworks_focus-ids_000101 > --------------------------------------------------------------------------- > --------------------------------------------------------------------------- Captus Networks IPS 4000 Intrusion Prevention and Traffic Shaping Technology to: - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans - Automatically Control P2P, IM and Spam Traffic - Precisely Define and Implement Network Security & Performance Policies FREE Vulnerability Assessment Toolkit - WhitePapers - Live Demo http://www.securityfocus.com/sponsor/CaptusNetworks_focus-ids_000101 ---------------------------------------------------------------------------
_________________________________________________________________Hotmail Extra Storage讓你獲得10MB 額外儲存空間,請即申請! http://join.msn.com/?pgmarket=zh-hk
--------------------------------------------------------------------------- Captus Networks IPS 4000Intrusion Prevention and Traffic Shaping Technology to: - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans
- Automatically Control P2P, IM and Spam Traffic - Precisely Define and Implement Network Security & Performance PoliciesFREE Vulnerability Assessment Toolkit - WhitePapers - Live Demo http://www.securityfocus.com/sponsor/CaptusNetworks_focus-ids_000101
---------------------------------------------------------------------------
Current thread:
- Re: Network hardware IPS barking phrog (Oct 02)
- <Possible follow-ups>
- Re: Network hardware IPS cheong frank (Oct 06)
