IDS mailing list archives
Re: Avoiding VLAN bridge with N-IDS?
From: ADT <synfinatic () gmail com>
Date: Mon, 9 Aug 2004 16:55:59 -0700
On Mon, 09 Aug 2004 19:31:54 +0000, Chris Conacher <chris_conacher () hotmail com> wrote:
My understanding is that the deployment of N-IDS in a VLANd environment where the switch is spanned to enable a single N-IDS to sniff all VLAN traffic creates the risk that the IDS sensor can form a bridge to where someone can compromise the N-IDS machine and then use that to sniff all traffic or else move from VLAN to VLAN. Is there information on deploying N-IDS in switched and VLANd environments that do not require one N-IDS per VLAN and avoid the above risk if it does exist?
Generally speaking, NIDS are deployed with a dedicated management interface so that the sniffing interface does not have an IP address. While this still allows a NIDS to be attacked, it makes gaining access to the NIDS much more difficult. Even better, put a restrictive inbound and outbound firewall policy for the NIDS. Of course, if the attacker gets through your defenses, nothing prevents them from sniffing all the traffic. However, using a network tap would prevent them from injecting packets back into the network, assuming your IDS doesn't use some lame attempt to reset malicous connections. -Aaron -- http://synfin.net/ -------------------------------------------------------------------------- Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708 to learn more. --------------------------------------------------------------------------
Current thread:
- Avoiding VLAN bridge with N-IDS? Chris Conacher (Aug 09)
- Re: Avoiding VLAN bridge with N-IDS? Rodrigo Barbosa (Aug 09)
- Re: Avoiding VLAN bridge with N-IDS? ADT (Aug 10)
- Re: Avoiding VLAN bridge with N-IDS? Mike Frantzen (Aug 11)
