1) Depending on how you set it up, I would say yes, also limit the users that can log 
in remotely. also concider using a remote log tool, such as remote 
syslogd, to avoid that need

2) none and yes. Ideally, you don't want the IDS station to be seen at all from the 
outside, concider using a one-way ethernet cable (recieve no-send) on the 
listening interface. Of course for this, you would need a second interface to connect 
to your network for either remote log-in or remote syslogd or whatever 
logging facility you're using

3) It is a good idea, I don't remember the statistic right now, but a large percentage 
of all attacks come from inside your network. Once again, ideally, the 
internal IDS shouldn't be detectable, but I see no problems running it physically on 
the same box on a seperate interface, provided you're using the 
afore-mentioned one-way ethernet cable.

Other suggestions, Nothing comes to mind, but depending on the size and topology of 
your network, you may want to carfully concider where you want to put 
internal IDSs.

On Fri, Jan 31, 2003 at 09:34:19AM -0800, Naman Latif wrote:
> 
> Hi,
> I am in the process of setting up and IDS system using Linux\Snort in
> DMZ. A couple of questions regarding this
> 
> 1. Is it a safe practice to have access to this system from Inside
> Network (for retrieving log files etc) from 1-2 Stations ? Ofcourse IDS
> won't have access to inside network and be blocked by Firewall.
> 
> 2. What kind of services should be running on IDS Station ? Should all
> Web\FTp etc services be stopped ?
> 
> 3. How important it is to also have an IDS system monitoring the traffic
> on your Inside Network ? I believe it won't be a good idea to have the
> SAME DMZ IDS system with another NIC monitoring Inside Network Traffic ?
> 
> Any other suggestions OR any Links that I can refer to ?
> 
> Regards \\ Naman

-- 
Frank Barton
Starwolf.biz Systems Administrator

Attachment: msg10967/pgp00000.pgp
Description: PGP signature

Reply via email to