[Snort-users] Why only detecting host-based attacks?

David Chait davidc at ...4306...
Wed Jun 26 09:25:05 EDT 2002

Make sure you are not plugged into a switch rather than a HUB (and if you
are...make sure port spanning is enabled for that machine). My guess is
Snort can't even see the traffic to begin with.

-----Original Message-----
From: snort-users-admin at lists.sourceforge.net
[mailto:snort-users-admin at lists.sourceforge.net]On Behalf Of Terry J
Dunlap Jr
Sent: Wednesday, June 26, 2002 9:12 AM
To: snort-users at lists.sourceforge.net
Subject: [Snort-users] Why only detecting host-based attacks?

I'm a newbie to snort and the IDS field. I've loaded snort 1.8.6 onto a
FreeBSD 4.6 box. I have it configured as var HOME_NET x.x.x.0/24. I also
have it configured as var EXTERNAL_NET !$HOME_NET.

To test, I will ssh to a remote machine at home, run Nmap and Nessus
against different machines on my network. The only reports I get are
those scans and probes against the machine upon which snort is
installed. I get no info regarding the scans and probes of the other
machines on the network.

When I launch snort -v for sniffer mode, I'm able to see all the network
traffic. So I know promiscuous mode works. When snort is in IDS mode,
I've run ifconfig to confirm the NIC is in promiscuous mode as well.

Am I missing something in the .conf file? I've read the Snort User's
manual (maybe not closely?).



This sf.net email is sponsored by: Jabber Inc.
Don't miss the IM event of the season | Special offer for OSDN members!
JabberConf 2002, Aug. 20-22, Keystone, CO http://www.jabberconf.com/osdn
Snort-users mailing list
Snort-users at lists.sourceforge.net
Go to this URL to change user options or unsubscribe:
Snort-users list archive:

More information about the Snort-users mailing list