Yeah this question comes up about once every month or two.
The few times I tried to run a real NIPS it was a near-disaster. There
are just too many FP opportunities to avoid stepping on someone's
legitimate traffic. IMHO, the only sensible way to try is with HIPS, for
reasons that should be fairly obvious.
OTOH, I did use the snortsam components built into Barnyard and ran a
snortsam listener on the firewall. I set up a snortsam.conf that would
block for custom times, depending on the rule triggered. No, it wouldn't
block the actual packets that triggered the alert, but the block would
usually go into effect less than a minute after the alert happened, and
sometimes within a few seconds. And yes, sometimes they'd be FP and I
had to undo the block, fix the alert trigger, and tell the annoyed user
to try again.
--
Mit besten Grüßen
Shane Castle