-
Notifications
You must be signed in to change notification settings - Fork 759
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Suricata IPS does not seem to drop #1664
Comments
|
Also opted here; https://forum.opnsense.org/index.php?topic=5261.0 but did not get a very clear answer from the helping hand ;) |
|
@chiel1980 please try the test rule first and check if eicar blocks, our homenet is correctly configured. see also https://forum.opnsense.org/index.php?topic=4711.msg21016#msg21016 |
|
Hi Ad, I enabled the plugin, download & update and try to test it from a box behind my firewall/IPS: And yes it triggers an alert: But still no other alerts are triggered (like dshield, port scans, etc): What else can I try? |
|
Like I explained in the forum thread, a lot of the rules trigger when coming from the external network and go to the home network (192.168.0.0/16,10.0.0.0/8,172.16.0.0/12). |
|
Hi Ad, thanks for your reply. I tested that with nmap and get no results, I also enabled the dshield, feodore, etc. no alerts. Is there any way I can troubleshoot this and can you show me an example of your own setup with a nmap from the outside against your WAN interface and that it triggers an alert? I simply can not reproduce alerts by just settings some options in the GUI. |
|
I checked the suricata.log in /var/log and for example I see: Not sure if that can be the culprit? |
|
you can add your wan network manually to HOME_NET (/usr/local/etc/suricata/suricata.yaml ) and restart suricata ( Please inspect the rules you want to match first (they're not that difficult the read) and fabricate traffic that matches that. |
|
Adding the WAN interface to $HOME_NET does trigger alerts (like port scans). |
|
I've added my LAN and GUEST interfaces and that seems to get some more alerts and blocks (especially for my port forwarded hosts). |
|
If you can spare some time to improve the documentation on this subject, that would be great. We're using Sphinx (http://www.sphinx-doc.org/en/stable/index.html) for our documentation (https://docs.opnsense.org/manual/), but any other documentation format is ok too. Please send your contribution to project@opnsense.org, and we'll try to incorporate it asap. The best thing is probably to add a section about (basic) setup, as far as I see that's missing from our documentation at the moment. |


Hi!
I am trying OPNSense:
OPNsense 17.1.7-amd64
FreeBSD 11.0-RELEASE-p10
OpenSSL 1.0.2k 26 Jan 2017
On an APU2C4 with Suricata enabled, IPS enabled, promiscious enabled, interface; WAN,new rules installed and enabled ET-scan and more.
I also changed the rules from alert to drop.
No matter how hard I try: I don't see any blocks in my alerts tab using nmap -sS/nmap -sT against the WAN interface from a VPS to my OPNsense box.
I also noticed that I see no alerts at all, only STREAM alerts but no drops (I also expect Dshield and Comrpomised alerts from chinese ip adressess but no alerts at all).
My questions:
I haven't experienced this with PFsense with suricata and/or snort.
Any pointers would be more then welcome :)
The text was updated successfully, but these errors were encountered: