You need to be given a switch port that has been placed in promiscuous mode.

Convincing the network guys...

This reinforces the point why you can tell how important security is to an 
organization by how high it reports to senior management.  If you're 
reporting to a COO or senior VP, you can use your clout and position to 
ensure security is given it's proper due.  If you're low on the totem 
pole.........it'll all depend upon how good you are at persuasion.

At 03:19 PM 7/28/00 -0400, [EMAIL PROTECTED] wrote:


>We are trying to implement Real Secure IDS and are unable to analyze the
>traffic because of switched environment. Our network guys says because we
>are using high end backbone and core switches we cannot give you a spam port
>or place a hub. My question is how do other large companies implement IDS in
>a switched environment. Any lead you can give me to help convince the
>network guys to spare layer 2 port on each segment to place ISS network
>engines would be greatly appreciated.
>
>siddika
>
>
>
>================================================================================
>      To unsubscribe from this mailing list, please see the instructions at
>                http://www.checkpoint.com/services/mailing.html
>================================================================================ 
>




-
"As soon as men decide that all
means are permitted to fight an evil,
their good becomes indistinguishable
from the evil they set out to destroy."
                       --Christopher Dawson



================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to