@eleanor:
Hi,
I would like to know what are best practices regarding running Snort on PFsense and using PFsense as FW as well as IDS solution. I instlalled and configured Snort on pfsense without a problem, but Snort has put my interfaces in promiscous mode (WAN inteface as well as LAN interface), thus making them unreachable. Therefore I couldn't connect with VPN to the pfsense anymore and I had to manually reset snort.
Not sure I understand what you mean by "unreachable". I use Snort on three interfaces (WAN, LAN and DMZ) and have no problem using the OpenVPN package for client connections.
@eleanor:
What are best practices to run Snort on pfsense?
Thank you
Most folks run it on the WAN interface using a combination of Snort VRT and Emerging Threats rules. My personal recommendation is to run it on both the WAN and LAN interfaces with different rules on each. For the WAN, I used the ET-CIARMY, ET-RBN and other block list rules containing known poor reputation IPs. For the LAN side, I use the Snort VRT "Balanced IPS Policy" combined with some of the Emerging Threats Trojan and Worm rules.
Bill