Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Bypass filtering of a LAN device

    Scheduled Pinned Locked Moved IDS/IPS
    5 Posts 2 Posters 837 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • I
      inline6
      last edited by

      I have suricata running on LAN & WAN interfaces and the outbound activity of one lan device keeps getting alerted as information leak for SSH... but I want to allow the traffic.

      I have created a LAN firewall rule to allow everything from that IP To any destination but suricata continues to filter/drop the connections.

      How might I easily allow all outbound traffic from this LAN IP to not be filtered?

      S 1 Reply Last reply Reply Quote 0
      • S
        SteveITS Galactic Empire @inline6
        last edited by

        @inline6 Firewall rules and Suricata are unrelated.

        There are two ways:

        1. On the Alerts tab click one of the plus signs for that alert to suppress the IP for that rule, or suppress the rule or disable the rule for all devices.

        2. In Suricata, create a Pass List and add your IP (keep all the Auto boxes checked). In the interface, assign the pass list. Restart Suricata on the interface.

        Likely there is no need to run it on both WAN and LAN? I suggest LAN because on WAN it will scan, flag and block traffic that would be blocked by the firewall anyway. And on LAN it shows LAN IPs whereas on WAN that will show the public WAN IP.

        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
        Upvote 👍 helpful posts!

        I 1 Reply Last reply Reply Quote 0
        • I
          inline6 @SteveITS
          last edited by

          @steveits thank you for that, I was able to add surpress rules on LAN for the internal IP... but because it is also running on WAN I had to add supress rules for the destination addresses there as well. Which is not ideal, are you saying I should turn it off on the WAN interface entirely?

          S 1 Reply Last reply Reply Quote 0
          • S
            SteveITS Galactic Empire @inline6
            last edited by

            @inline6 said in Bypass filtering of a LAN device:

            I should turn it off on the WAN interface entirely

            We only set it up on LAN for our clients. You can just stop it for a while, if you want. Otherwise you'll scan every packet twice.

            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
            Upvote 👍 helpful posts!

            I 1 Reply Last reply Reply Quote 0
            • I
              inline6 @SteveITS
              last edited by

              @steveits said in Bypass filtering of a LAN device:

              @inline6 said in Bypass filtering of a LAN device:

              I should turn it off on the WAN interface entirely

              We only set it up on LAN for our clients. You can just stop it for a while, if you want. Otherwise you'll scan every packet twice.

              That is the route I will go, thank you again.

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.