20
Chapter 1     Introduction to Intrusion Detection and Snort
1.7.1
Snort on Stealth Interface 
You can run Snort on a stealth interface which only listens to the incoming traffic
but does not send any data packets out. A special cable is used on the stealth interface.
On the host where Snort is running, you have to short pins 1 and 2. Pins 3 and 6 are con 
nected to same pins on the other side. Please see Snort FAQ at http://www.snort.org/
docs/faq.html for more information on this arrangement.
1.7.2
Snort with no IP Address Interface
You can also use Snort on an interface where no IP address is assigned. For exam 
ple, on a Linux machine, you can bring up interface 
eth0
 using command  
ifconfig
eth0 up
  without assigning an actual IP address. The advantage is that when the Snort
host doesn't have an IP address itself, nobody can access it. You can configure an IP
address on eth1 that can be used to access the sensor itself. This is shown in Figure 1 9.
On Microsoft Windows systems, you can use an interface without binding TCP/IP
to the interface, in which case no IP address will be assigned to the interface. Don't for 
get to disable other protocols and services on the interface as well. In some cases it has
been noted that winpcap (library used on Microsoft Windows machines to capture
packets) does not work well when no IP address is assigned on the interface. In such a
case, you can use the following method.
Figure 1 9 Snort sensor with two interfaces. One of these has no IP address assigned.






footer




 

 

 

 

 Home | About Us | Network | Services | Support | FAQ | Control Panel | Order Online | Sitemap | Contact

toronto web hosting

 

Our partners: PHP: Hypertext Preprocessor Cheap Web Hosting JSP Web Hosting Ontario Web Hosting  Jsp Web Hosting

Cheapest Web Hosting Java Hosting Cheapest Hosting

Visionwebhosting.net Business web hosting division of Vision Web Hosting Inc.. All rights reserved