?
Solved

IDS Helps

Posted on 2004-08-18
2
Medium Priority
?
141 Views
Last Modified: 2010-04-17
Dear All

I have another important question.

Now I have my IDS connected to my lan.. my network is like this ...

I have 20 sites(Networks) 9 of them are connected using a Fiber cable (same subnet) and the other are connected to me using one router.
Can IDS in my location (site1) detects the Intrusions in other sites which connected to me by a router??
i can ping any Ips in thos sites.
0
Comment
Question by:ibmas4002
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 28

Expert Comment

by:mikebernhardt
ID: 11836340
IDS has to be in the same Ethernet collision domain as the network you want to monitor. A common way to do this is to use port mirroring on a switch, or to put a hub in the traffic path. You can't do what you're asking.
0
 
LVL 11

Accepted Solution

by:
PennGwyn earned 375 total points
ID: 11837122
An IDS needs to be able to see all of the traffic that could be of interest.  Options are:

1. put it on a hub or spanned/mirrored port so that it sees all of the traffic in (or passing through) the subnet, or

2. put it in as a gateway so that all traffic between A and B (say, between Internet and LAN) passes through it.

It doesn't sound like your plan matches either alternative, so it probably will not achieve what you had hoped for.

0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Did you know SD-WANs can improve network connectivity? Check out this webinar to learn how an SD-WAN simplified, one-click tool can help you migrate and manage data in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The Cisco RV042 router is a popular small network interfacing device that is often used as an internet gateway. Network administrators need to get at the management interface to make settings, change passwords, etc. This access is generally done usi…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Suggested Courses

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question