IDS mailing list archives

RE: Nagios


From: Mikael Björn <mikael.bjorn () mibj01 dyndns org>
Date: Sat, 7 Jun 2003 12:58:48 +0200

I've been using this fine product for years both as Nagios and under 
it's former name NetSaint for building production environments including 
large telcos and small & medium businesses.

My opinion is that you can without a problem use SNORT with Nagios but use
the two product as separate entities and use either the SNMP gateway or 
some other form of communication mechanisms in SNORT (I, myself, prefer 
SNMP) to talk to Nagios.

But if you want to handle Firewall rule adaptation from SNORT I would
use SnortSAM for that. Quite a neat little hack!

Hope my $0.02 was helpful!

/Mikael Björn
Freelance Consultant

-----Original Message-----
From: Jennifer Fountain [mailto:JFountain () rbinc com] 
Sent: Thursday, June 05, 2003 11:17 PM
To: FOCUS-IDS () securityfocus com
Subject: Nagios


Does anyone have an opinion on Nagios?  They say it can use snort and it
has it's own IDS functions to detect certain traffic.  I am wondering if
this is a good product or just hype. 
Thanks!

Cheers,
Jenn


----------------------------------------------------------------------------
---
INTRUSION PREVENTION: READY FOR PRIME TIME?

IntruShield now offers unprecedented Intrusion IntelligenceTM capabilities 
- including intrusion identification, relevancy, direction, impact and
analysis 
- enabling a path to prevention.

Download the latest white paper "Intrusion Prevention: Myths, Challenges,
and Requirements" at: 
http://www.securityfocus.com/IntruVert-focus-ids2
----------------------------------------------------------------------------
---


-------------------------------------------------------------------------------
INTRUSION PREVENTION: READY FOR PRIME TIME?

IntruShield now offers unprecedented Intrusion IntelligenceTM capabilities
- including intrusion identification, relevancy, direction, impact and analysis
- enabling a path to prevention.

Download the latest white paper "Intrusion Prevention: Myths, Challenges, and Requirements" at:
http://www.securityfocus.com/IntruVert-focus-ids2
-------------------------------------------------------------------------------


Current thread: