• hard pfsense ids,ips

    1
    0 Votes
    1 Posts
    376 Views
    No one has replied
  • Suricate error on pfSense-2.4.4 snapshot

    2
    0 Votes
    2 Posts
    443 Views
    bmeeksB
    @trumee, please report this on the Redmine bug reporting site at https://redmine.pfsense.org/. This is a warning message from the new PHP 7 interpreter. It is harmless for now, but if you report it on the Redmine site it will get logged and corrected. Thanks, Bill
  • snort blocking dns servers

    5
    0 Votes
    5 Posts
    2k Views
    bmeeksB
    @rogg said in snort blocking dns servers: its other trouble - snort blocking dns ip address which is whitelisted in snort configuration. When Snort blocks on a triggered alert, it can block either the Source IP, Destination IP or Both depending on a setting on the Interface Configuration tab. As @NogBadTheBad stated, check the Alerts tab to see which rule or rules are being triggered and blocking. You can filter on the tab by IP address to help in locating rules with your DNS server IP in either the SRC or DST columns.
  • View snort alerts outside of PFSense

    3
    0 Votes
    3 Posts
    650 Views
    S
    Thank you Nog, that's done the trick.
  • SNORT

    Moved
    12
    0 Votes
    12 Posts
    1k Views
    I
    Greetings. Thank you . i have enabled the LAN and it does start making sense. Thank you very much for all your advice. Still much to learn :)
  • Suricata on the SG-3100 does not survive a firmware upgrade

    22
    0 Votes
    22 Posts
    3k Views
    stephenw10S
    Ah, thanks for that. We'll look into it here then. Steve
  • Snort stops and can't restart when using custom rules

    5
    0 Votes
    5 Posts
    678 Views
    T
    Yes, thank you for the best practice on what SID to use for custom rules, This was the information that was missing from the resources available online ( Although i did not look thoroughly so i might have just missed it ). In any case this is resolved. Thank you.
  • Snort GUI Package v3.2.9.7 Release Notes

    1
    0 Votes
    1 Posts
    517 Views
    No one has replied
  • Moved Suricata from WAN to LAN, can't Remote Desktop in

    12
    0 Votes
    12 Posts
    2k Views
    bmeeksB
    You really, really, really need to use a VPN for RDP. That is the most secure. You can easily configure OpenVPN on pfSense. That also eliminates the need for NAT port-forwarding.
  • Is Snort single threaded?

    3
    0 Votes
    3 Posts
    1k Views
    bmeeksB
    The current Snort package on pfSense is based on the Snort 2.9.11 binary, so it is single-threaded.
  • Issue with Snort Barnyard2 and Bro integration

    1
    0 Votes
    1 Posts
    503 Views
    No one has replied
  • Ways to improve IDS performance in PfSense?

    9
    0 Votes
    9 Posts
    4k Views
    W
    I had every rule set checked just for testing purposes. But now i will check out if changing IPS policy will do a big improvement in my network. Thank you so much for your help, cheers!
  • Potential Suricata Inline Netmap Solution

    8
    0 Votes
    8 Posts
    2k Views
    NollipfSenseN
    @derpy456789 said in Potential Suricata Inline Netmap Solution: Hello NollipfSense, Just wondering what kind of system/specs are you running suricata inline on and also did you change any setting inside the interface setting of suricata like the Detection engine settings for max pending packets ? Ive been getting the same error netmap_grab_packets bad pkt Thanks Sorry for the late reply...I am running an HP Pavillion a6242n with Intel 82575 NIC 8GB RAM.
  • Suricata silent timeouts in inline mode to specific http requests

    2
    0 Votes
    2 Posts
    492 Views
    S
    I suspect there's something wrong with inline mode as we've had cases where traffic doesn't flow but no alert is logged. See https://forum.netgate.com/topic/131572/moved-suricata-from-wan-to-lan-can-t-remote-desktop-in/10 https://forum.netgate.com/topic/109581/suricata-inline-whitelisting/8
  • Snort ruleset update causing firewall to crash/reboot

    9
    0 Votes
    9 Posts
    1k Views
    M
    I think I may have found the problem by uninstalling snort and trying suricata: After installing suricata, same problem happens. Then I tried an older version of the snort rules: snortrules-snapshot-29110.tar.gz works snortrules-snapshot-29111.tar.gz causes firewall to crash! So, something is definitely wrong with the pfSense code... a content update should not crash the firewall!
  • snort + squid + clamAV

    1
    0 Votes
    1 Posts
    933 Views
    No one has replied
  • Unable To Install Suricata

    2
    0 Votes
    2 Posts
    536 Views
    S
    This is a wild guess but does your router have a file named /usr/local/etc/suricata?
  • Best way to analyze blocked packets

    1
    0 Votes
    1 Posts
    337 Views
    No one has replied
  • Failed to parse the IP address

    4
    0 Votes
    4 Posts
    3k Views
    S
    @cukal Using Suricata wasn't all that scientific...we had to start somewhere, Suricata is multi-threaded and Snort isn't, and there were packages for both so we tried one. As I vaguely recall Suricata was developed by OISF as something of a next gen Snort, and it's compatible with Snort rules. Search "snort vs suricata" and you will find a bunch on it.
  • Best way to block some gaming sites

    3
    0 Votes
    3 Posts
    3k Views
    johnpozJ
    @vacquah said in Best way to block some gaming sites: Fortnite Your best bet would be to sniff to see exactly what is being used for this game, the fqdn that are being queried for, and or ports used, etc. More than likely this is hosted on some CDN somewhere.. My guess would be AWS. Then sure a simple host override on pfsense dns to send this fqdn to nowhere, ie loopback or 0.0.0.0 or even sure somewhere that presents a info page on 80/443 to not use company bandwidth, etc. Only problem with dns blocking - is you have to make sure your clients can not use some other sort of dns to resolve it. So you have to force all clients to use pfsense via dns redirection, and or only allow dns to pfsense and block all others. There is always away around.. You could tunnel out on 443 for example, you could use dnscrypt via some open port, etc. But a dns block and or simple blocks of the ports it uses if they are specific and not standard ports like http/https can stop the vast majority of typical users. Problem is once user figures out how to bypass your restrictions it spreads fast!!! Content filtering and or blocking is normally always an uphill battle that is hard to win.. If users want out, they normally can find a way. This day an age though users just going to play the game on their phones via their cell connection. But atleast then they are not using company resources and bandwidth ;) Good Luck!!!
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.