?
Solved

Transparen firewall, IDS best practices

Posted on 2008-10-20
1
Medium Priority
?
386 Views
Last Modified: 2012-06-21
Hi,

I will be setting up ASA in transparent mode with IDS do you know sites that give "best practices" for that kind of scenarios? Examples of documentation after implementation would be also good.

Thank you.
0
Comment
Question by:kamsuj
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 16

Accepted Solution

by:
SteveJ earned 2000 total points
ID: 22770365
http://www-search.cisco.com/application/pdf/paws/97853/Transparent-firewall.pdf

Start with Cisco . . . for general IDS "best practices" look at some of the Snort documentation or Snort forums.

Good luck,
SteveJ
0

Featured Post

Limited time offer using promo code EXPERTS30

Designed with a wealth of functionality and convenience, ATEN's new Thunderbolt™ 2 Sharing Switch takes your Thunderbolt setup to the next level. Now through September 15, 2017, Experts Exchange members get 30% off the US7220 on the ATEN USA eShop using promo code EXPERTS30.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article explains the fundamentals of industrial networking which ultimately is the backbone network which is providing communications for process devices like robots and other not so interesting stuff.
This month, Experts Exchange’s free Course of the Month is focused on CompTIA IT Fundamentals.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question