Snort mailing list archives
functionality question
From: Eric Garnel <egarnel3470 () yahoo com>
Date: Sun, 25 May 2003 09:36:58 -0700 (PDT)
The network that I manage is unique in that I often have "guests" connecting to my access level switches for a short time only (1 to 5 days). Occasionally, we get a guest machine that is infected and is "blabbing" out to the internet. It sometimes becomes an issue when one of the groups such as abuse.net comes back with a complaint. Usually, the client has moved on already and the offending address is back in the pool. Is snort the right tool and if so, does anyone have any pointers on how to configure it to watch for outbound malicious traffic only (scans, known signatures, etc.)? My 1st thought is to set the HOME_NET to any and the EXTERNAL_NET to my dhcp address ranges. I am trying to have a way of determining if there is malicious activity stemming from my network before I have to hear about it from someone else. ===== Eric Garnel CCNP, MCSE eric () garnel com ------------------------------------------------------- This SF.net email is sponsored by: ObjectStore. If flattening out C++ or Java code to make your application fit in a relational database is painful, don't do it! Check out ObjectStore. Now part of Progress Software. http://www.objectstore.net/sourceforge _______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users
Current thread:
- functionality question Eric Garnel (May 25)
- <Possible follow-ups>
- RE: functionality question bmcdowell (May 27)