On Thu, Mar 20, 2003 at 04:46:30PM -0800, mike Hughes wrote:
> Whats Up!
> 
> think they are suppose to be there???
> 
> "/var/log/snort/206.204.10.200"
> "/var/log/snort/206.204.10.200/ICMP_ECHO"
> "/var/log/snort/206.204.10.200/TCP:4325-1080"
> "/var/log/snort/206.204.10.200/TCP:5097-1080"
> "/var/log/snort/66.134.127.35"
> "/var/log/snort/66.134.127.35/UDP:4866-1434"
> "/var/log/snort/212.244.158.151"
> "/var/log/snort/212.244.158.151/UDP:1706-1434"
> "/var/log/snort/65.54.248.22"
> "/var/log/snort/65.54.248.22/ICMP_UNRCH_PACKET_FILT"
> "/var/log/snort/217.57.54.226"
> "/var/log/snort/217.57.54.226/UDP:2133-1434"
> "/var/log/snort/4.60.127.39"
> "/var/log/snort/4.60.127.39/ICMP_ECHO"
> 
> 
> How can i cut down on all this logging!!!

Yeah. This happens if you make snotr log to the filesystem. You'll be be
better off in the long run setting up a database (I use mysql, but there is
support for postgresql and even mssql). Also, if you setup the ACID console
you will get much more meaningful information, and more manageability over
it. Also, during the first time check the false positives you get, and see
if you can setup exclusion rules for that traffic, so you get less
irrelevant alerts. Doing this, I managed to suppress about 50000 thousand
false positives/day.

Most notably, I have found that traffic internal to a LAN is quite full of
stuff that snort believes to be attacks, so I would strongly advise to place
your snort sensor outside your firewall.

Cheers,
-- 
Javier Gostling D.
<[EMAIL PROTECTED]>



-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to