Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Customizing HOME_NET to bypass Vuln Scanner

    Scheduled Pinned Locked Moved IDS/IPS
    1 Posts 1 Posters 363 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      MK247
      last edited by

      Hey Guys,

      I'm looking to bypass my Nessus vulnerability scanner from Snort inspection. Snort blows up whenever I run these scans so I'd like to suppress this behavior from this one source IP. I try doing this by creating a custom FW alias and excluding the scanner IP of 192.168.3.X. I use this as the HOME_NET variable however it appears the 192.168.3.0/24 subnet is automatically added even though "Add firewall Locally-Attached Networks to the list (excluding WAN)." is UNCHECKED.

      Does anyone know of a way around this or another way of achieving this? Reading previous threads it looks like this is done intentionally. I'd like to keep my external_net as 'ANY' for the added visibility.

      1 Reply Last reply Reply Quote 0
      • First post
        Last post
      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.