Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IDS/IPS on DMZ PBX System

    Scheduled Pinned Locked Moved IDS/IPS
    11 Posts 3 Posters 1.0k Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P Offline
      Patch @NollipfSense
      last edited by

      @nollipfsense said in IDS/IPS on DMZ PBX System:

      What rules have others use

      • White list ports and IP addresses the VoIP system needs to access.

      • Use a alias for each VoIP companies IP addresses

      • Use and alias combining VoIP company specific aliases in your firewall rules

      I don't use Suricata but would consider it for location specific rules if remote access from a wider range of IP addresses was required.

      NollipfSenseN 1 Reply Last reply Reply Quote 0
      • NollipfSenseN Offline
        NollipfSense @Patch
        last edited by NollipfSense

        @patch I was hoping that since I mentioned IDS/IPS and post in IDS/IPS section of the forum that the response(s) would be specifically rules on either Suricata or Snort. Location will be just U.S or North America. I got my firewall setup...thanks for responding.

        pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
        pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

        P 1 Reply Last reply Reply Quote 0
        • P Offline
          Patch @NollipfSense
          last edited by Patch

          @nollipfsense said in IDS/IPS on DMZ PBX System:

          rules on either Suricata or Snort. I got my firewall setup

          So what specifically do you trying to achieve by using Suricata on PBX network traffic?

          NollipfSenseN 1 Reply Last reply Reply Quote 0
          • NollipfSenseN Offline
            NollipfSense @Patch
            last edited by NollipfSense

            @patch said in IDS/IPS on DMZ PBX System:

            @nollipfsense said in IDS/IPS on DMZ PBX System:

            rules on either Suricata or Snort. I got my firewall setup

            So what specifically do you trying to achieve by using Suricata on PBX network traffic?

            I don't know yet...I watched Jimp's video on setting up DMZ and that was one of the things mentioned towards the end, and it got me thinking. So, I looked through Suricata rules but only Emerging-voip rules seems applicable...hence my quest to learn what others have done

            I see Snort has voip rules as well as protocol_voip, even the protocol_voip.so rules.

            pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
            pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

            1 Reply Last reply Reply Quote 0
            • NollipfSenseN Offline
              NollipfSense
              last edited by

              I cannot imagine I am the only person wanting to use IDS/IPS on a phone system tied to pfSense. So, I share from my little research. Snort appears the tool to use especially the VRT subscriber protocol-voip rules that have two hundred and sixty-six (266), whereas Suricata, according to: https://doc.emergingthreats.net/bin/view/Main/EmergingFAQ#VOIP_Rules
              VOIP Rules: A new and emerging ruleset. Small at the moment, but we expect it to grow soon.

              One can view the Snort subscriber rules for protocol-voip here:
              https://github.com/John-Lin/docker-snort/blob/master/snortrules-snapshot-2972/rules/protocol-voip.rules

              I also found this voip use case for IDS/IPS from Purdue University, if anyone wants to read: https://engineering.purdue.edu/dcsl/publications/papers/2009/voipids_ijis09_submit.pdf

              So, I will be using Snort IDS as well as lock the firewall down super tight to make the DMZ phone system trusted. I might also use two SIP trunk providers.

              pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
              pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

              S 1 Reply Last reply Reply Quote 0
              • S Offline
                SteveITS Rebel Alliance @NollipfSense
                last edited by

                @nollipfsense Not sure the ET ruleset existed when I first set ours up? I would also add your SIP trunk provider IPs to the pass list. We also allow web connections and client ports by country.

                Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
                Upvote 👍 helpful posts!

                P NollipfSenseN 2 Replies Last reply Reply Quote 0
                • P Offline
                  Patch @SteveITS
                  last edited by

                  @steveits said in IDS/IPS on DMZ PBX System:

                  I would also add your SIP trunk provider IPs to the pass list. We also allow web connections and client ports by country.

                  That’s a cleaner way of saying what I was trying to convey in post #2

                  • SIP trunk provider only via white listed IP / domain name and allowed ports (no IDS/IPS involved)

                  • Web and client connections (if your PBX is set up to allow them) may benefit from IDS/IPS such as to restrict countries access is allowed from.

                  1 Reply Last reply Reply Quote 0
                  • NollipfSenseN Offline
                    NollipfSense @SteveITS
                    last edited by

                    @steveits & @Patch Yes, that the way I had planned except I shall use a WAN floating rule with quickset check with the SIP trunk provider IP and aliases with the ports.

                    pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
                    pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

                    P 1 Reply Last reply Reply Quote 0
                    • P Offline
                      Patch @NollipfSense
                      last edited by Patch

                      @nollipfsense said in IDS/IPS on DMZ PBX System:

                      WAN floating rule with quickset check with the SIP trunk provider IP and aliases with the ports

                      I use

                      1. Aliases for IP and port groups

                      2. For incomming to my premises: a Wan rule associated with the PBX port forwarding rule. It uses Aliases from 1, to limit the scope of the port forewarding.

                      3. For outgoing from my PBX VLan: VLan rules using aliases from 1, to restrict outgoing to the required ports & IP addresses.

                      Floating rules could be used to simulate the above but are less specific, so less maintainable imo.

                      I don't currently allow external client access to my PBX, but if I did, restricting exposure surface by country maybe useful.

                      NollipfSenseN 1 Reply Last reply Reply Quote 0
                      • NollipfSenseN Offline
                        NollipfSense @Patch
                        last edited by

                        @patch I am learning how to use Haproxy's reverse proxy and using private domain (secret TLS/SNI) to help make the PBX more secure in the DMZ...very interesting...I'll post in the proxy section questions I may have.

                        pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
                        pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.