After deciding on an operating system (OS) to use for your Snort IDS sensors, you will need to configure networking. Ideally, you should have a minimum of two network
Requires Free Membership to View
The management interface should be on a trusted network, usually your LAN, or a dedicated management VLAN or segment. You can configure it as you normally would for your OS and environment.
|
||||
Windows, Unix and Linux all support un-numbered interfaces. For example, to bring up eth1 as an un-numbered interface on a Red Hat or derivative Linux distribution, use your favorite text editor to create or edit /etc/sysconfig/network-scripts/ifcfg-eth1 so it looks like this:
DEVICE=eth1
ONBOOT=yes
Running an un-numbered interface under Windows is also easy, but counter intuitive. For example, under Windows 2000 simply right click on "My Network Places" and choose Properties. Right click the appropriate connection, e.g. "Local Area Connection 2" and choose Properties again. Verify that you are working with the correct physical interface by checking the name and/or properties (i.e. MAC address) of the network interface card, then uncheck all components, especially "Client for Microsoft Networks" and "Internet Protocol {TCP/IP}." You would think this action disables the card, but it doesn't. It will not show up under ipconfig /all, but it will if you use the snort –W command. Run snort –W and note the number of the interface you will use for sniffing (e.g. 2), then test that Snort is working by a command like snort –vi 2. If Snort suddenly stops working in the future, check snort –W again as Windows sometimes changes the interface numbers when you make changes to networking.
In any case, make sure you cable appropriately after configuring your un-numbered network interface. You don't want to plug the management interface into the un-trusted segment or vice versa.
SNORT INTRUSION DETECTION AND PREVENTION TECHNICAL GUIDE
Introduction
Why Snort makes IDS worth the time and effort
How to identify and monitor network ports after intrusion detection
How to handle network design with switches and segments
Where to place IDS network sensors
Finding an OS for Snort IDS sensors.
How to determine network interface cards for IDS sensors
Modifying and writing custom Snort IDS rules
How to configure Snort variables
Where to find Snort IDS rules
How to automatically update Snort rules
How to decipher the Oinkcode for Snort's VRT rules
Using IDS rules to test Snort
| JP Vossen, CISSP, is a Senior Security Engineer for Counterpane Internet Security. He is involved with various open source projects including Snort, and has previously worked as an information security consultant and systems engineer. |
This was first published in May 2005
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation