亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? faq.tex

?? This is the snapshot of Snot Latest Rules
?? TEX
?? 第 1 頁 / 共 5 頁
字號:
Then run it with the HOME\_NET set appropriately for the networkyou're defending in your rules file.  A default rules file comes with thesnort distribution and is called ``snort.conf'' You can run this basic rulesetwith the following command line:\begin{verbatim}snort -A full -c snort.conf\end{verbatim}If it's all set right, make sure the interface is in promiscuous mode by running the command from another window:\begin{verbatim}ifconfig -a\end{verbatim}The output from ifconfig should show if the interface is in promiscuous mode.  If it's not, there should be a way to set it manually.Note that the default output mode (-A full) of Snort should not beused except in very controlled environments.  It is the slowest wayto run Snort and presents several hard to recover from problemswith inode creation on filesystems.For people doing real IDS work, use something like (-A fast -b) tocombine fast alert mode with tcpdump binary log files or use theunified format coupled with Barnyard.\subsection{Where are my log files located?  What are they named?}The default location for logs is /var/log/snort. If snort is started with ``-l$<$directory$>$'', then the logs will be located in the directory specified.In the past, running Snort in daemon mode (-D) produced a file named``snort.alert.'' For consistency's sake, this has been changed. Running Snort inboth standard or daemon modes (-D) will produce a file named ``alert.''Note the log file naming convention changed between 1.8 and 1.9. That funnyalphanumeric soup at the end of the new names is a UNIX timestamp. This helpsavoid file conflicts.\subsection{Why does Snort complain about /var/log/snort?}It requires this directory to log alerts to it. Try running the command:\begin{verbatim}    mkdir -p /var/log/snort\end{verbatim}Make sure the logging directory is owned by the user Snort is running as.\subsection{Where's a good place to physically put a Snort sensor?}This is going to be heavily influenced by your organizations policy, andwhat you want to detect.  One way of looking at it is determining if youwant to place it inside or outside your firewall.  Placing an IDS outsideof your firewall will allow you monitor all attacks directed at yournetwork, regardless of whether or not they are stopped at the firewall.This almost certainly means that the IDS will pick up on more eventsthan an IDS inside the firewall, and hence more logs will be generated.Place an IDS inside your firewall if you are only interested in monitoringtraffic that your firewall let pass.  If resources permit, it may be bestto place one IDS outside and one IDS inside of your firewall.  This wayyou can watch for everything directed at your network, and anything thatmade it's way in.ADDENDA AD NAUSEUMNote: So this one still gets a lot of traffic even though it's in the FAQ. ErekAdams has noted this comprehensive and authoritative discussion of thisperpetual discussion item---mildly edited, also see faq question about switcheshubs and taps -drIf your router/switch can do port mirroring, then just connecting a network IDSto it would be fine. Or else a hub could be another option. Most network IDSescan have a NIC that acts as a passive sniffer anyway.As to where to place the sensor. I would go for both, one to monitor theexternal, one for the internal. I work in a distributor for security products,so over instrumentation is fun :) And in any case, if the traffic does not passby the Sensor it will not get monitored. So some people deploy IDS on theirinternal segments too, I believe.{\bf In ``front'' of the firewall(s):}Pro: Higher state of alert you know what attacks you are facing.Con: Wall to Wall of data, boring? If your firewall has NAT turned on, trackingthe sources originating from your internal network is difficult.{\bf ``Behind'' the firewall(s):}Pro: Only what gets through the firewall gets monitored? Less load on the IDSanalyst. You get to see what hosts are sending traffic to the internet.Con: Less idea of the state of the environment, false sense of safety.{\bf Where should IDS be placed relative to firewalls? Explore the pros and cons ofplacing IDS inside or outside firewall. What are the drawbacks of each?}\begin{itemize}  \item {\bf MARCUS RANUM from NFR Security:} "I'd put mine inside. Why should I care if    someone is attacking the outside of my firewall? I care only if they    succeed, which my IDS on the inside would ideally detect. Placing the IDS    on the outside is going to quickly lull the administrator into complacency.    I used to have a highly instrumented firewall that alerted me whenever    someone attacked it. Two weeks later I was deleting its alert messages    without reading them. Another important factor arguing for putting it    inside is that not all intrusions come from the outside or the firewall. An    IDS on the inside might detect new network links appearing, or attackers    that got in via another avenue such as a dial-in bank.''      \item {\bf CURRY from IBM:} ``The IDS should be placed where it will be able to see as    much of the network traffic you're concerned about as possible. For    example, if you're concerned about attacks from the Internet, it makes the    most sense to put the IDS outside the firewall. the most sense to put the    IDS outside the firewall. This gives it an ``unobstructed'' view of    everything that's coming in. If you put the IDS inside the firewall, then    you're not seeing all the traffic the bad guys are sending at you, and this    may impact your ability to detect intrusions.''    \item {\bf SUTTERFIELD from Wheel Group:} ``IDS ideally plays an important role both    inside and outside a firewall. Outside a firewall, IDS watches legitimate    traffic going to public machines such as e-mail and Web servers. More    importantly IDS outside a firewall will see traffic that would typically be    blocked by a firewall and would remain undetected by an internal system.    This is especially important in detecting network sweeping which can be a    first indication of attack. External systems will also give you the benefit    of monitoring those services that firewalls determine are legitimate.    Putting an IDS inside the firewall offers the added benefit of being able    to watch traffic internal to the protected network. This adds an important    element of protection against insider threats. The major drawback of IDS    inside a firewall is that it cannot see a good deal of important traffic    coming from untrusted networks and may fail to alert on obvious signals of    an impending attack.''    \item {\bf CHRIS KLAUS from ISS:} ``Outside the firewall is almost always a good    idea---it protects the DMZ devices from attack and dedicates an additional    processor to protecting the internal network. Just inside the firewall is    also useful-it detects attempts to exploit the tunnels that exist through    the firewall and provides an excellent source of data for how well your    firewall is working. Throughout your intranet may be the best place for IDS    deployment, however. Everyone agrees that attacks aren't the only things    we're worried about-there's internal mischief, fraud, espionage, theft, and    general network misuse. Intrusion detection systems are just as effective    inside the network as outside, especially if they're unobtrusive and easy    to deploy.''    \item {\bf GENE SPAFFORD:} ``The IDS must be inside any firewalls to be able to detect    insider abuse and certain kinds of attacks through the firewall. IDS    outside the firewall may be useful if you want to monitor attacks on the    firewall, and to sample traffic that the firewall doesn't let through.    However, a true IDS system is likely to be wasted there unless you have    some follow-through on what you see.''        \vspace{10pt}   Bottom Line:{\bf DRAGOS RUIU:} ``Just pick a spot you're likely to look at the logs for. :-)''\end{itemize}\subsection{Libpcap complains about permissions problems, what's going on?}You are not running Snort as root or your kernel is not configured correctly.\subsection{ I've got RedHat and ....}Check your version of libpcap.  If it's not $>=$ 0.5, you should update.\subsection{Where do I get the latest version of libpcap? }You can find the most current version at:\htmladdnormallink{http://www.tcpdump.org}{http://www.tcpdump.org/}You might also want to have a look at Phil Wood's patches to libpcap for Linux:    \htmladdnormallink{http://public.lanl.gov/cpw/}{http://public.lanl.gov/cpw/}    \subsection{Where do I get the latest version of Winpcap?}	\htmladdnormallink{http://winpcap.polito.it/}{http://winpcap.polito.it/}\subsection{What version of Winpcap do I need?\label{winpcap}}It depends. If you only have one processor, you can use the most currentversion (3.x). If you have a SMP box, you'll have to use either an olderversion ($<$ 2.3) or the 3.x version plus a patch from \htmladdnormallink{http://www.ntop.org/winpcap.html}{http://www.ntop.org/winpcap.html}.\subsection{Why does building Snort complain about missing references? }You must configure libpcap with the --install-incl option.  (On Red Hat, install the libpcap-devel rpm.)\subsection{Why does building snort fail with errors about yylex and lex\_init? }You need the lex and yacc tools or their gnu equivalents flex and bison installed.\subsection{I want to build a Snort box.  Will this $<$Insert list of hardware$>$ handle $<$this much$>$ traffic? }That depends. Lower the number of rules is a standard performance increase.Disable rules that you don't need or care about. There have been manydiscussions on 'tweaking performance' with lots of 'I handle XX mb with a \_\_\_machine setup.' being said. Look at some of the discussions on the snort-usersmailing lists.Here is an oft quoted bit on the subject from Marty:``Hardware/OS recommendations''Ok, here are the guidelines and some parameters. Intrusion detection is turninginto one of the most high performance production computing fields that is inwide deployment today. If you think about the requirements of a NIDS sensor andthe constraints that they are required to operate within, you'll probably startto realize that it's not too hard to find the performance wall with a NIDSthese days.The things a NIDS needs are:\begin{enumerate}\item  MIPS (Fast CPU)\item  RAM (More is *always* better)\item  I/O (Wide, fast busses and high performance NIC)\item  AODS (Acres Of Disk Space)\end{enumerate}A NIDS also needs to be pretty quick internally at doing its job. Snort's seenbetter days in that regard (when 1.5 came out the architecture was a lotcleaner) but it's still considered to be one of the performance leadersavailable.As for OS selection, use what you like. When we implement Data AcquisitionPlugin's in Snort 2.0 this may become more of a factor, but for now I'm hearingabout a lot of people seeing alot of success using Snort on Solaris, Linux,*BSD and Windows 2000. Personally, I develop Snort on FreeBSD and Sourcefireuses OpenBSD for our sensor appliance OS, but I've been hearing some goodthings about the RedHat Turbo Packet interface (which would require mods forSnort to use, not to mention my general objection to RedHat's breaking stuffall the time). (ed note: take a drink, see FAQ 7.2 -dr)\subsection{What are CIDR netmasks? }(Excerpt from url: \htmladdnormallink{http://public.pacbell.net/dedicated/cidr.html}{http://public.pacbell.net/dedicated/cidr.html})CIDR is a new addressing scheme for the Internet which allows for more iefficient allocation of IP addresses than the old Class A, B, and C address scheme.\begin{center}\begin{tabular}{llr}{\bf CIDR Block} & {\bf Equivalent Class C} & {\bf Addresses}\\/27 & 1/8th of a Class C & 32 hosts \\/26 & 1/4th of a Class C & 64 hosts\\/25 & 1/2 of a Class C & 128 hosts\\/24 & 1 Class C & 256 hosts\\/23 & 2 Class C & 512 hosts\\/22 & 4 Class C & 1,024 hosts\\/21 & 8 Class C & 2,048 hosts\\/20 & 16 Class C & 4,096 hosts\\/19 & 32 Class C & 8,192 hosts\\/18 & 64 Class C & 16,384 hosts\\/17 & 128 Class C & 32,768 hosts\\/16 & 256 Class C & 65,536 hosts \\ /15 & 512 Class C & 131,072 hosts\\/14 & 1,024 Class C & 262,144 hosts\\/13 & 2,048 Class C & 524,288 hosts\\\end{tabular}\end{center}For more detailed technical information on CIDR, check out the following RFCs:\begin{itemize}\item RFC 1517: Applicability Statement for the Implementation of CIDR\item RFC 1518: An Architecture for IP Address Allocation with CIDR\item RFC 1519: CIDR: An Address Assignment and Aggregation Strategy\item RFC 1520: Exchanging Routing Information Across Provider Boundaries in the CIDR Environment\end{itemize}RFCs are available at \htmladdnormallink{http://www.rfc-editor.org/rfcsearch.html}{http://www.rfc-editor.org/rfcsearch.html}\subsection{What is the use of the ``-r'' switch to read tcpdump files?  }Used in conjunction with a Snort rules file, the tcpdump data can beanalyzed for hostile content, port scans, or anything else Snort can be used to detect.  Snort can also display the packets in a decoded format, which many people find is easier to read than native tcpdump output. \section{Configuring Snort}\subsection{How do I setup snort on a `stealth' interface? }\label{stealth}In *BSD and Linux:\begin{verbatim}ifconfig eth1 up\end{verbatim}Solaris:\begin{verbatim}ifconfig eth1 plumbifconfig eth1 up\end{verbatim}For NT/W2K/XP users, try the following:NOTE: You are at your own risk if you follow these instructions.  Editingyour registry is DANGEROUS and should be done with extreme caution.  Followthese steps at your OWN risk.\begin{enumerate}\item Get your device's hex value.  ('snort -W' works for this)\item open Regedt32\item Navigate to: HKEY\_LOCAL\_MACHINE$\backslash$SYSTEM$\backslash$CurrentControlSet$\backslash$Services$\backslash$Tcpip$\backslash$Parameters$\backslash$\linebreak Interfaces$\backslash$\{XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX\}\item Select the network card you wish to setup as the monitoring interface (this will be the \{XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX\} value).\item Set IPAddress:REG\_MULTI\_SZ: to null (Double click on the string, delete data in the Multi-String Editor, then click OK)\item Set SubnetMask:REG\_MULTI\_SZ: to null (Double click on the string, delete data in the Multi-String Editor, then click OK)\item Set DefaultGateway:REG\_MULTI\_SZ: to null (Double click on the string, delete data in the Multi-String Editor, then click OK)\item Close the Registry Editor, your changes will be saved automatically.\item In a command prompt, run 'ipconfig' to verify the interface does not have an IP bound to it.\end{enumerate}If you do not recieve an IP address listing from the interface youmodified, you are good to go.  To run snort with the specified interface,use the -i flag such as 'snort -v -d -p -i1' \subsection{How do I setup a receive-only ethernet cable?}Use an ethernet tap, or build your own 'receive-only' ethernet cable.Anyway, here is the cable I use: 

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美不卡一二三| 欧美性一二三区| 中文字幕一区二区不卡| 97se亚洲国产综合在线| 综合激情成人伊人| 欧美日韩一区二区三区在线| 日韩高清不卡一区二区| 久久免费视频色| 99视频精品全部免费在线| 亚洲福利一二三区| 精品久久人人做人人爰| av电影在线观看不卡| 香蕉影视欧美成人| 久久久久久久久伊人| 99久久99精品久久久久久| 调教+趴+乳夹+国产+精品| 精品国产百合女同互慰| 99精品视频在线观看免费| 午夜精品久久久久久久99水蜜桃| 精品久久久久99| 91久久精品一区二区三| 蜜桃av一区二区三区电影| 国产精品美女久久久久久| 欧美日韩国产天堂| 国产suv精品一区二区三区| 亚洲国产成人tv| 国产视频一区在线观看| 欧美日精品一区视频| 黄一区二区三区| 午夜精品久久久久久久久| 国产日韩欧美精品在线| 欧美日韩精品三区| 成人一区二区三区| 日韩av电影天堂| 亚洲天堂网中文字| 久久人人超碰精品| 欧美人体做爰大胆视频| jlzzjlzz欧美大全| 九九**精品视频免费播放| 亚洲一区免费视频| 国产精品不卡在线| 亚洲欧洲国产日韩| 精品欧美一区二区在线观看| 91传媒视频在线播放| 国产成人精品在线看| 强制捆绑调教一区二区| 亚洲色图都市小说| 国产精品热久久久久夜色精品三区| 7777精品伊人久久久大香线蕉完整版 | 成人va在线观看| 另类小说欧美激情| 婷婷亚洲久悠悠色悠在线播放| 中文字幕一区三区| 中文乱码免费一区二区| 亚洲精品在线电影| 欧美一级欧美三级| 欧美久久久久久蜜桃| 色婷婷国产精品| eeuss鲁片一区二区三区| 成人午夜私人影院| 成人免费看视频| 国产精品99久久久久久有的能看| 蜜桃久久久久久久| 奇米一区二区三区| 免费成人av资源网| 蜜桃视频在线观看一区二区| 日韩国产欧美在线观看| 亚洲二区在线观看| 日韩高清中文字幕一区| 日韩黄色在线观看| 日本三级韩国三级欧美三级| 亚洲成人在线免费| 日产欧产美韩系列久久99| 日精品一区二区| 日本免费新一区视频| 五月天欧美精品| 免费观看在线综合色| 久久精品国产澳门| 国内久久婷婷综合| 国产a久久麻豆| 99re在线精品| 在线视频你懂得一区二区三区| 99re这里只有精品首页| 在线免费观看日韩欧美| 欧美色区777第一页| 制服丝袜中文字幕亚洲| 欧美大片拔萝卜| 久久久国产精品午夜一区ai换脸| 国产欧美一区二区精品婷婷| 亚洲国产精品av| 一区二区三区中文字幕电影| 午夜一区二区三区在线观看| 天天操天天干天天综合网| 激情小说欧美图片| 成人午夜电影小说| 色婷婷一区二区三区四区| 欧美系列一区二区| 日韩精品综合一本久道在线视频| 精品久久一区二区三区| 欧美国产禁国产网站cc| 一区二区欧美精品| 久久精品噜噜噜成人av农村| 国产成人精品在线看| 色综合天天综合给合国产| 欧美一区二区三区色| 日韩欧美国产三级电影视频| 精品久久久久久久久久久久久久久| 国产欧美综合色| 亚洲国产裸拍裸体视频在线观看乱了 | 欧美日韩成人在线| 日韩欧美亚洲国产精品字幕久久久| 精品va天堂亚洲国产| 国产精品久久久久久久久免费桃花 | 不卡影院免费观看| 欧美日本在线播放| 国产亚洲综合av| 肉丝袜脚交视频一区二区| 国内精品视频666| 色爱区综合激月婷婷| 日韩久久久久久| 一区二区三区在线免费观看| 奇米一区二区三区| 99热国产精品| 欧美一区二区三区白人| 亚洲人亚洲人成电影网站色| 日本亚洲最大的色成网站www| av高清久久久| 久久久久青草大香线综合精品| 亚洲午夜影视影院在线观看| 成人综合在线视频| 欧美二区三区91| 一区在线观看免费| 国产精品1024| 精品入口麻豆88视频| 亚洲第一福利视频在线| www.在线欧美| 久久久综合激的五月天| 日本午夜精品一区二区三区电影| 91丝袜呻吟高潮美腿白嫩在线观看| 欧美哺乳videos| 肉肉av福利一精品导航| 91久久人澡人人添人人爽欧美| 欧美国产一区在线| 国产在线精品视频| 日韩欧美国产一区在线观看| 亚洲小说欧美激情另类| 91麻豆蜜桃一区二区三区| 国产午夜精品一区二区| 国产在线播精品第三| 欧美电影免费观看高清完整版在线 | 欧美伊人久久大香线蕉综合69| 中文字幕一区二区三区四区不卡| 国产露脸91国语对白| 日韩午夜三级在线| 免费在线欧美视频| 欧美一级一区二区| 日一区二区三区| 91精品国产综合久久香蕉的特点| 亚洲自拍偷拍图区| 欧洲生活片亚洲生活在线观看| 日本成人在线一区| 欧美一区二区三区四区久久 | 日本中文字幕不卡| 91.成人天堂一区| 青青国产91久久久久久| 欧美一级二级在线观看| 日本成人在线不卡视频| 日韩欧美国产一区二区在线播放 | 亚洲欧美在线aaa| 99久久精品免费| 亚洲精品欧美激情| 色噜噜久久综合| 亚洲午夜电影网| 91精品国产综合久久国产大片| 日韩不卡一区二区三区 | 久久久蜜臀国产一区二区| 国产精品一区二区男女羞羞无遮挡| 日韩欧美一区中文| 国产一区二区在线观看免费| 久久精品一区四区| 色综合久久九月婷婷色综合| 一区二区成人在线视频| 91精品婷婷国产综合久久竹菊| 麻豆91免费看| 国产蜜臀97一区二区三区| 97超碰欧美中文字幕| 午夜不卡在线视频| 久久夜色精品国产噜噜av| 成人永久免费视频| 亚洲午夜免费福利视频| 欧美va在线播放| jizz一区二区| 午夜日韩在线电影| 26uuu精品一区二区在线观看| 丁香啪啪综合成人亚洲小说| 亚洲精品成人a在线观看| 日韩欧美国产高清| 成人av午夜影院| 肉肉av福利一精品导航| 国产欧美精品国产国产专区|