Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How to cleanly get data to security onion?

    Scheduled Pinned Locked Moved General pfSense Questions
    12 Posts 7 Posters 3.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by johnpoz

      @happyrouter said in How to cleanly get data to security onion?:

      moving data from the interfaces in promiscuous mode into a NUC running security onion

      How exactly is that going to get your data to your NUC?

      If you want your NUC to see data that is flowing over a port, this is normally done via your switching infrastructure with a port mirror or span port.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        You can do a span port on a bridge in pfSense to get all traffic to the NUC.

        You can also use Snort in pfSense as sensor for Seciruty Onion by exporting logs to it.

        I would be tempted to run vitualised on that hardware though to better use it's resources. Just run pfSense and Security Onion on there.

        Steve

        JonathanLeeJ 1 Reply Last reply Reply Quote 1
        • A
          akuma1x
          last edited by

          Exactly like @stephenw10 says. 1 VM running pfsense, another VM running whatever operating system Security Onion agrees with. Export from pfsense into Security Onion and do your analysis.

          Jeff

          1 Reply Last reply Reply Quote 0
          • happyrouterH
            happyrouter
            last edited by

            Ok, thanks guys/gals! A span port it is!

            V 1 Reply Last reply Reply Quote 0
            • V
              vijay7 @happyrouter
              last edited by

              @happyrouter
              But SPAN port won't wont give the layer 7 application visibility, like the traffic belongs to facebook, netflix etc..

              how to achieve this then ?

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Why do you think that?

                A span port will give you visibility into everything from layer 2.

                Steve

                V 1 Reply Last reply Reply Quote 0
                • NollipfSenseN
                  NollipfSense @happyrouter
                  last edited by

                  @happyrouter Security Onion seems much software just to use Wireshark.

                  pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
                  pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

                  1 Reply Last reply Reply Quote 0
                  • V
                    vijay7 @stephenw10
                    last edited by

                    @stephenw10 incase of NtopNG, if you send span port traffic to it, it will give you great visibility into Layer7 traffic, why can be done with Security onion.

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      Right, that's what I said, so what's the question here?

                      1 Reply Last reply Reply Quote 0
                      • JonathanLeeJ
                        JonathanLee @stephenw10
                        last edited by JonathanLee

                        @stephenw10

                        I am going to attempt this today with Security onion running as a VM inside Hyper-V I had it running before in Hyper-V to play around with, I could access it from any of the machines in my house. I am going to send my logs all to it. I hope that the machine running Hyper-V can data marshal what needs the logs however. I am learning that you can set up port mirroring so that the data sent from PfSense can be seen inside of the SEIM system.

                        Make sure to upvote

                        JonathanLeeJ 1 Reply Last reply Reply Quote 0
                        • JonathanLeeJ
                          JonathanLee @JonathanLee
                          last edited by JonathanLee

                          @jonathanlee

                          I got it to work only with Virtualbox only, Security Onion was accessible. I set up port forwarding. However I could not access it outside of of the guest machine. Many SSL errors. I have major issues now with Windows 10 running Hyper-V without it being enabled. I also had the blue screen of death. This was the reason for using virtualbox. Security Onion would not work correctly with Hyper-V for me. I also used a NIC mac to clone for data marshalling to test if it would clone my laptops IP and that worked.

                          This leaves me with questions like is there any container protected NICs security equipped network cards for high security systems like firewalls. My reason for the question is the data marshalling with a clone MAC, and how containers have no visibility with the antivirus on the physical machines. I have also been told during my cyber security classes that scanning for VM and containers are a current issue in the cyber security world. I stated to wonder if software could control a security chip built onto the NIC and take control of all NIC features with the physical host machine's software, and control approved container and virtual software access right on the card. Enough daydreaming for me. . .

                          If you want to check out more info on this adventure to try to get this to work in a virtual environment here is my aftermath issues, that really point out some current security issues with today's hardware.

                          More on Containers and Network Card Security Issues:
                          https://answers.microsoft.com/en-us/protect/forum/all/hyper-v-running-even-after-being-disabled/8d048265-d0d9-465d-b647-9e121ea059bf

                          VirtualBox Install of Security Onion:
                          https://docs.securityonion.net/en/2.3/virtualbox.html#:~:text=Click%20the%20icon%2C%20then%20select,%E2%80%9CAdvanced%E2%80%9D%20options%2C%20set%20%E2%80%9C

                          Port Forward with VirtualBox:
                          https://www.golinuxcloud.com/configure-nat-port-forwarding-virtualbox-cli/

                          Make sure to upvote

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.