Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations Westi on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

PIX and Intrusion Detection Systems

Status
Not open for further replies.

technical1

Technical User
Sep 2, 2002
52
GB
Hi,
I was after some general examples of what people used for Intrusion Detection Systems (IDS). Ive been told you shouldnt solely rely upon the PIX firewall for network security.

You should have some form of IDS running monitoring packets for any hacking attempts which the PIX may not pick up.

So what other forms of security do people use, that are effective.

Regards,
Vinay
 
If you're up to the challenge of a steep learning curve, Snort is free, and about as good as it gets for signature-based IDS. In my opinion, the jury is still out on heuristic IDS systems and whether they really do trim the false positives (which are the biggest headaches of IDS).

If you have $2000-$3,000, look at Demarc's PureSecure ( It's based on Snort, but with a very nice GUI that goes a long way to presenting the data in a readable format.
 
Hi,
Thanks for your response, I have looked at SNORT seems very intense.

But what does everyone else use?
I imagine there are lots of PIX users here, do they have anything else in place apart from the PIX. My point is can you solely rely upon the PIX to filter out the nasties?

Regards,
Vinay
 
Short answer, no.

You also need to rely on host-based IDS...which is what Snort is. A Pix is basically a network-level IDS. Once a hacker is past it, it no longer logs anything. You need separate logging on each host that needs to be protected.

You should be hard on the outside, crunchy on the inside.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top