@FreeYourMind:
Hi bmeeks,
thank you for your quick reply and effort to help me out.
You were right, killing states was still unchecked and after i enabled it, it worked for me.
Unfortunately torrent traffic is still going through but at least the webpage from where i got the torrent file gets blocked.
With games its a little bit odd too, i can still play them but in case of d3 and wow it seems snort blocks the attempt to download an upcoming patch through the background downloader butr doesn`t reject the eonnection to the gaming servers itself.
If you dont mind me asking there is something about the configuration of snort i didnt understand.
All rules are working with the $Home net and $External Net variables but shouldnt be the WAN interface on which i activated snort be considered as $External Net? When i click on the view list button for home net it lists all my private networks but including the ip of my wan interface. That doesnt make sense to me or am i totally wrong here?
You don't want to ever block your own WAN interface. Then nothing would get through your box. You want to block either the far-end source or destination host, or sometimes one of your LAN clients. You don't want blocks directly on any of the firewall interface IP addresses. If that happened, you would be completely locked out of the firewall. So that's why the firewall interface IPs (including the WAN IP) get put in $HOME_NET and included in the default PASS LIST of "never blocked" IP addresses.
As for your torrent and game stuff, are you sure that all the necessary rules are actually in place? You will need to examine carefully the rules you have selected. Doing this requires understanding the rule syntax and how rules operate in Snort or Suricata. There are lots of how-to and tutorial links to be found on Google for that. Snort only blocks what a rule specifically identifies. To elaborate, the rules you are using may work off a simple list of IP addresses. If that list only includes say popular torrent web sites (for fetching the torrent files themselves), then attempts to download the torrent file itself would be identified, but later connecting to some random seeder may not be if the IP address is not in the list. Same for game servers. I'm not saying this is your issue, but it is a possibility. You will need to examine the P2P and GAMES rules individually to see what they are actually looking for to kick off an alert.
Bill