Hi,
 
You must review all the logs that you have because of the follwing:

- The IDS does not include all the possible vulnerabilities (there may
be new ones).
- You can find more information from the fw log file.It can guide you to
the specific location that the intruder is interested in.
- The FW log file contains the errors and any other malicious actions
that can affect your FW itself.



-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Mon, October 15, 2001 9:04 AM
To: [EMAIL PROTECTED]
Subject: IDS logs vs FW1 logs


In regards to external connections and access log montitoring,
what/would 
there be a reason to monitor your FW logs if you already have an IDS and

logging in place on that system??

Regards,
Nic

Reply via email to