Hello fellas...
Info of my network structure
- Linux Server --- Snort runs on this machine --- :
Which is the router of the network within my apartment. It is natting the internet connection to the clients, serving Dhcp, has an iptables configured firewall (has two ethīs of course. The home network NIC (eth1) and the outside (internet) NIC (eth0)).
- Client 1 (Windows 98)
- Client 2 (Windows XP)
Ok! Here is the concern: What would be the correct way to make snort analyze portscans, dos attacks, overflow attacks to my Linux server coming from the outside network?
My snort HOME_NET variable stands for an IP inside my network (i.e: 192.168.0.0/24). Is this right? Isnīt snort, then, analyzing attacks, portscans and exploits that happen from my very own network towards my very own network? For example DOS attacks from machine 192.168.0.45 towards machine 192.168.0.197 (assuming these are valid IPīs within the network)?
Sorry about the loooooooooong question.
Thank you very much!
