Snort mailing list archives
Re: Best Practices for external sensors
From: Todd_Pratt () hartehanks com
Date: Thu, 17 Jun 2004 09:25:41 -0400
It depends on your switch. Either use a switch where the mirror port cannot participate in LAN traffic (read-only) or use a passive TAP. This way, the sensor can see the traffic but cannot write packets that other nodes on the network will actually see. Make sure you can't communicate with other hosts on the external network. Todd Pratt Systems Security Certified Practitioner IT Security Administrator Harte Hanks, Inc. ph 978-436-3368 tpratt () hartehanks com <jonasb () alum rpi edu> Sent by: snort-users-admin () lists sourceforge net 06/17/2004 09:04 AM To <snort-users () lists sourceforge net> cc Subject [Snort-users] Best Practices for external sensors I currently have a Snort infrastructure set up on my internal network with several sensors managed via SnortCenter, logging to a centralized MySQL DB. I am looking to deploy a sensor on our outside network (off of a mirrored port on a switch). There are several firewalls with outside interfaces on this switch. I'm trying to get an idea of the best/most secure way to funnel alerts/logs back into the network to our centralized logging server. I thought of some type of VPN tunnel inbound, but my concern is that if the sensor were to be compromised, there would be a direct path into the network. I obviously don't want to multi-home the sensor inside/outside. Is my best bet just to open up SQL connectivity from this external sensor to the inside DB on the firewall and stream the alerts that way? If so, does anybody know of a way of any type of wrapper that would encrypt these alerts? Thanks Brad
Current thread:
- Best Practices for external sensors jonasb (Jun 17)
- Re: Best Practices for external sensors Todd_Pratt (Jun 17)
- <Possible follow-ups>
- Re: Best Practices for external sensors M. Morgan (Jun 17)
- RE: Best Practices for external sensors Truax, Shawn (MBS) (Jun 18)
