rmulyadi
Level 1
Level 1
Member since ‎07-03-2003
‎08-18-2017

User Statistics

  • 26 Posts
  • 0 Solutions
  • 0 Helpful votes Given
  • 0 Helpful votes Received
Recent Badges
5 Discussion Posts
20 Discussion Posts
First Discussion
First Question
10 Discussion Posts
1 Reply
10 Replies
5 Replies

User Activity

Will 'sh conf' output of the 5.0 code list all enabled signatures or just those tuned ones?
I am trying to convert this snort sig and would like to shun the attacker. alert tcp any any -> $HOME_NET 22 (msg:"BLEEDING-EDGE Potential SSH Brute Force Attack"; flow:to_server,established; flags:S; threshold:type limit, track by_src, count 5, seco...
Is it recommended to enable all sensing interfaces (eth7&8) in this case?I actually tried to, but it seems that all traffic always go to eth7. Am I missing something?Thanks!
We are using a Catalyst 6000 to load balance traffic from various switches into several ids sensors. We span each switches and forward the traffic to ports with different VLANs on the Catalyst 6000 to make sure that the traffic coming in the 1st por...
Is there a more detail info than the nsdb pages on what exactly each signature is looking for?
Community Statistics
Member Since ‎07-03-2003 09:11 AM
Date Last Visited ‎08-18-2017 03:50 AM
Posts 26