CTO, Convergent Information Security Solutions, LLC
https://www.convergesecurity.com
Advice given as posted on this forum does not construe a support relationship or other relationship with Convergent Information Security Solutions, LLC or its subsidiaries. Use the advice given at your own risk.
CTO, Convergent Information Security Solutions, LLC
https://www.convergesecurity.com
Advice given as posted on this forum does not construe a support relationship or other relationship with Convergent Information Security Solutions, LLC or its subsidiaries. Use the advice given at your own risk.
Here's the rub: the IPS is only snort. I'm not sure whether it's "deeper" inspection or just "more". And "more" does not imply "intelligence".
* 7.40x: all LDAP traffic DMZ Internal works fine
* 7.50x: some LDAP traffic DMZ Internal works fine (my LDAP queries came back after 2-3 minutes)
I think the blanket use of an IPS such as snort is defence via assumed protection:
1. We assume that snort has a complete and comprehensive rule set. Does it?
2. We assume that when snort intercepts and drops packets then is must be doing it's job. It doesn't. It's dumb.
Hence I think the blanket use of snort is flawed:
1. I know the protocols that I run between certain segments of my network
2. I know that server A talking to server B using protocol Y is correct
And yes I know I can reconfigure Astaro IDS to report rather than drop. IMHO report should be the out of the box configuration rather than drop.
Why? Well by virtue of the fact that I have to disable rules or allow exceptions this leads me to believe that the use of IPS should be targeted. Hence, an inverse configuration scenario would be beneficial:
1. Enable IPS (enabled in reporting mode only)
2. Apply IPS to specific firewall rules (eg. internet -> HTTP server)
3. Only apply specific IPS policies to that firewall rule (why intercept and test for DNS when I know HTTP is the only traffic to pass via that rule) along with general anomaly protection.
The obvious counter argument is that you could run other protocols on the same port but is my webserver vulnerable to someone attempting to throw malformed rsync packets at it? I think not.
Lastly, the IPS implementation on the ASGs is terrible for performance. It's easily the biggest memory and CPU hog especially when more than just a few interfaces are lit. We use a lot of Meru wifi gear with inbuilt firewalls and IPS - they tend to offload all that traffic processing to another device.
CTO, Convergent Information Security Solutions, LLC
https://www.convergesecurity.com
Advice given as posted on this forum does not construe a support relationship or other relationship with Convergent Information Security Solutions, LLC or its subsidiaries. Use the advice given at your own risk.