Snort IDS tips for VARs a

Installing Snort: Conclusion

This article demonstrated Snort installation and operation in three primary modes. It is very important to be able to replicate these simple activities before considering deploying Snort as part of an enterprise-level IDS, or even to tell Snort to start logging traffic to a database or other format. In future articles we'll move beyond this initial foray into productive deployment scenarios.


Snort: Fundamentals and installation tips for the channel

 Introduction
 Installation
 Sniffer mode
 Packet logger mode
 Intrusion detection mode
 Conclusion

About the author
Richard Bejtlich is founder of TaoSecurity, author of several books on network security monitoring, including Extrusion Detection: Security Monitoring for Internal Intrusions, and operator of the TaoSecurity blog (taosecurity.blogspot.com).


This was first published in December 2006

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: