Snort mailing list archives
Why only detecting host-based attacks?
From: Terry J Dunlap Jr <terrydunlap () netzero net>
Date: 26 Jun 2002 11:12:07 -0500
I'm a newbie to snort and the IDS field. I've loaded snort 1.8.6 onto a FreeBSD 4.6 box. I have it configured as var HOME_NET x.x.x.0/24. I also have it configured as var EXTERNAL_NET !$HOME_NET. To test, I will ssh to a remote machine at home, run Nmap and Nessus against different machines on my network. The only reports I get are those scans and probes against the machine upon which snort is installed. I get no info regarding the scans and probes of the other machines on the network. When I launch snort -v for sniffer mode, I'm able to see all the network traffic. So I know promiscuous mode works. When snort is in IDS mode, I've run ifconfig to confirm the NIC is in promiscuous mode as well. Am I missing something in the .conf file? I've read the Snort User's manual (maybe not closely?). Suggestions? Terry ------------------------------------------------------- This sf.net email is sponsored by: Jabber Inc. Don't miss the IM event of the season | Special offer for OSDN members! JabberConf 2002, Aug. 20-22, Keystone, CO http://www.jabberconf.com/osdn _______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users
Current thread:
- Why only detecting host-based attacks? Terry J Dunlap Jr (Jun 26)
- RE: Why only detecting host-based attacks? David Chait (Jun 26)