• Netmap (Suricata) cause crash

    suricata netmap crash
    6
    0 Votes
    6 Posts
    2k Views
    bmeeksB
    @giyahban said in Netmap (Suricata) cause crash: didnt know its not recommended to have vlan with inline mode. Inline IPS Mode has some limitations. The biggest is that VLANs and other virtual interfaces are not currently well supported. Things like a Bridge or LAGG setup will not work well. VLANs are especially problematic. There is some work happening within FreeBSD's netmap code to make things better, but none of those experimental updates are present in the pfSense kernel yet. If you want to use Inline IPS Mode, you should only deploy it on plain-vanilla Ethernet interfaces (meaning no VLANs defined and not a member of a LAGG or Bridge). You may get by with running Suricata on the physical parent interface only and NOT on each defined VLAN interface.
  • Passlists/Home_net and inline mode

    1
    0 Votes
    1 Posts
    212 Views
    No one has replied
  • Snort GPLv2 Community Rules update failed?

    6
    0 Votes
    6 Posts
    832 Views
    B
    Thank you everyone
  • [Solved] Snort GPLv2 Community Rules - Unable to download checksum file

    41
    0 Votes
    41 Posts
    9k Views
    DefenderLLCD
    The community rules are back: https://www.snort.org/downloads#rules [image: 1690924093721-8605de56-d4d6-4bcf-96c9-7f5c69e34db9-image.png] [image: 1690923819777-69f04bea-f17a-43e5-806d-659d0ca1d198-image.png]
  • Suricata Inline IPS breaks VLAN interfaces

    3
    0 Votes
    3 Posts
    499 Views
    A
    @bmeeks Thank you. Yes, I did actually try attaching Suricata to the parent, but it still caused problems. I'll have a play with legacy mode and see how that works. Thank you.
  • [solved] Suricata in legacy mode with Wireguard interface

    2
    0 Votes
    2 Posts
    377 Views
    Bob.DigB
    So it does work. [image: 1689777284892-capturexx.png]
  • pcap on alert

    7
    0 Votes
    7 Posts
    841 Views
    B
    @bmeeks It looks like they might have put this into v7. https://forum.suricata.io/t/how-to-log-alert-into-a-pcap/2127/4
  • 2.6.0 --> 2.7.0 Upgrade Crash Report

    Moved
    9
    0 Votes
    9 Posts
    2k Views
    bmeeksB
    @TAC57 said in 2.6.0 --> 2.7.0 Upgrade Crash Report: Something must be screwed up because if I reboot a number of packages don't automatically start, Yes, this would be a red flag that your upgrade did not complete properly.
  • 0 Votes
    9 Posts
    840 Views
    Yet_learningPFSenseY
    @SteveITS Thank you very much. I heard that even current antivirus software can be bypassed by creating viruses that can evade detection through pre-testing by attackers. However, if they are using AI for checking, it might be possible to detect them. I would like to consider using it.
  • everyday at 6am suricata crashes

    21
    0 Votes
    21 Posts
    2k Views
    E
    @bmeeks I believe I know why suricata would crash when geolite2 was updated and I believe suricata was using lots of data and holding ip address's well over 5000 them in snort2c tables, that, coupled with using too large a RAM Disk for /var & /tmp, I was simply out of ram. I have changed the ram disk size and adjusted suricata to NOT keep ip's longer than 7 days and this helped as I've had no more 6am suricata crash nor core dumps have occurred. I really appreciate all of you guys help here on the forum :) Thank you again!
  • Snort fatal error after emerging.rules update

    38
    0 Votes
    38 Posts
    6k Views
    EmergingThreatsE
    @InstanceExtension Greetings - and apologies all for the disruption this caused last week. As identified within this thread, two rules (SIDs 2046273 and 2046274) were released to the live ruleset with syntax errors. The rules had the "flow: stateless" option set with "to_server" also set which causes a Fatal Error within Snort. Upon investigation it was found that due to a text parsing issue in our QA infrastructure these errors were missed and the rules were released into production. Going forward, we have made adjustments to our QA process to ensure this will not recur and errors of this sort will be caught within our QA process and mended. The next morning we released an out-of-band update to address. Feel free to reach out here via DM, on twitter (@et_labs) or on our Discourse.
  • ET Rules or Snort Subscriber rule

    10
    0 Votes
    10 Posts
    3k Views
    DefenderLLCD
    @EmergingThreats said in ET Rules or Snort Subscriber rule: @DefenderLLC Greetings - unfortunately, there is currently no alternative pricing at that tier. I will let the sales team know of the interest, though. Thanks for the reply. I would be gladly pay a modest fee for both licenses. Perhaps you can offer a home lab license kind of like what Netgate does for pfSense+ licenses for home users.
  • SNORT pork borked

    1
    0 Votes
    1 Posts
    167 Views
    No one has replied
  • SNORT borked again and again LOL

    1
    0 Votes
    1 Posts
    149 Views
    No one has replied
  • it works for me

    1
    0 Votes
    1 Posts
    151 Views
    No one has replied
  • Snort: Alert log format

    logs format
    9
    0 Votes
    9 Posts
    7k Views
    D
    @johnnybee I have the same question. Please share with me if you have the answer. Thanks in advance.
  • Best way to block when behind a proxy

    4
    0 Votes
    4 Posts
    628 Views
    M
    @bmeeks was hoping there was some…trickery. But alas it’s reading the IP header so not much can be done
  • Suricata Alert Log View Filter

    3
    0 Votes
    3 Posts
    314 Views
    NogBadTheBadN
    @bmeeks Thanks Bill.
  • Snort block only inbound traffic

    2
    0 Votes
    2 Posts
    222 Views
    bmeeksB
    The only way to accomplish that would be to rewrite all the rules and reverse the direction logic. That's a lot of work.
  • Snort Custom Rule not alerting on traffic

    snort ids
    5
    0 Votes
    5 Posts
    2k Views
    E
    @bmeeks Ah, that is right. I might have gotten confused with that field. It does work omitting the content section. I appreciate your help!
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.