@cool_corona said in Log anomalies on the network??:
@bmeeks Totally agree.
BUT.... usually the scan of hosts includes the LAN Ip as well and I want pfsense/suricata to react and send an alert when proned by a network scan...
If you are running an IDS on the LAN interface, then it can respond to scans of that particular interface IP. It won't necessarily see scans from one LAN host directly to another LAN host in a switched network. That's because modern network switches will isolate traffic among ports, so even with the firewall's LAN interface in promiscuous mode, it won't see traffic among LAN hosts because the Ethernet switch will filter traffic among its ports based on the MAC registered on that port. So if the destination MAC is registered on say port 6, then only port 6 will see the traffic. To get around this, you need to use a SPAN port (or port mirroring, for the more generic term). If you run dumb network hubs (and not switches), then every port on the hub sees all traffic from other ports. That's not a good thing for performance, though.
Edit: I went back and read your reply again later. Not entirely sure what you mean by this statement:
BUT.... usually the scan of hosts includes the LAN Ip as well and I want pfsense/suricata to react and send an alert when proned by a network scan...
If the intruder is port scanning your firewall, then an IDS could detect that. So if the IDS was monitoring the WAN interface, and the intruder port scans the WAN, he could be detected. Ditto if the intruder were port scanning through your firewall to internal hosts. But if he can do that, then your firewall is nothing but swiss cheese (that is, shot full of holes), and your network is toast! Your earlier reply to @JKnott, when he asked "how do they get in initially?", was "any of those mentioned". So I answered the question from the point of view of endpoint devices on the internal network or networks. In other words, a bad actor or piece of malicious software running reconnaissance on the internal network.
Finally, note that Suricata really has no internal port scan detection mechanism. Snort, on the other hand, has a special port scan preprocessor. However, these tools are often fooled by legitimate traffic. That's one reason why Suricata never got a specific port scan module. There are some primitive Emerging Threats rules for Suricata that can sort of do port scan detection, ,but it's not the same technology as Snort uses.