On Wed, 17 Feb 2010 22:59 -0500, "Jason Beaudoin"
<jasonbeaud...@gmail.com> wrote:
> Hi There,
> 
> As I often have greater respect for a much larger portion of this list
> than the rest of the internet, I am curious what is thought about
> current IDS/IPS hardware from vendors like Trustwave, Checkpoint,
> Alert Logic, mod_security, even snort.. etc, and in particular, the
> sensibility and effectiveness of using them in high-security
> environments.

I use Snort in IDS mode on OpenBSD and am very satisfied with it. It's
hard to justify spending 10's or 100's of thousands of dollars for
commercial solutions that have the same issues as Snort (false
positives, requires tuning and constant monitoring). I have used large
IBM/ISS Proventia systems in the past. Some of the commercial offerings
will not even give you a terminal so you can use tcpdump... can you
believe that? You have the perfect spot on the network and the perfect
hardware, but you can only use it in a very limited fashion. Very
frustrating.

General purpose OpenBSD boxes with big beefy network interfaces cost a
lot less and does more. I use FreeBSD to run BASE as the analysis
frontend. The OpenBSD Snort sensors ship their alerts to it. I would use
OpenBSD for the frontend as well, but BASE is not currently in ports and
I have not had time to work on porting it and prefer not to go outside
of ports.

Also, I would stay away from IPS mode. There are enough network problems
as is without something randomly deciding to drop packets. There's no
better way to make a network engineer mad than to send them on a wild
goose chase trying to figure out why packets are not getting delivered
only to find out that the IPS is dropping them because certain SSL
traffic looks like a buffer overflow or something. 

That has been my experience.

Brad

> From a compliance perspective, I don't have much choice. From the
> costs, infrastructure, and administrative perspectives, I am currently
> evaluating whether or not I should be leaning towards and IDS or IPS
> solution, and of course which system/vendor. My understanding is that
> something like snort requires a fair bit of maintenance and
> IT-attention, the trade-off being cost, so I am leaning away from
> this. Between detection and prevention, preventing break-ins seems a
> bit sillier than trying to actively monitor what's going on and to
> then look for threats, so this pushes me more towards IDS over IPS.
> 
> Thoughts, suggestions, flames, are all welcome.
> 
> Thanks.
> 
> ~Jason

Reply via email to