Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Legitimate dest IPs blocked on snort2c:0… help!!!!

    Scheduled Pinned Locked Moved IDS/IPS
    6 Posts 3 Posters 1.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      alexolivan
      last edited by

      Hi forum!

      I have been reading around about snort2c table, but havent managed to get my legitimate traffic to pass through.
      This is something really annoying and don't know how to solve it.

      Basically, everything went smooth until I installed suricata and pfblockerng (mostly, they work good…though)
      I have setup top_lis legitimate IP list to ensure pass to no avail...
      I have even set a pass all temporary schema... but again no avail.

      My dest IP is an amazon ec2 instance which ip is somehow eneterd in snort2c table, as in system logs -> firewall the blocking is listed and related to the snort2c:0 stuff
      The problem is I do not know how to control it. (I asume there is some way to control it... or we are in a bug/feature case)

      I have cleared disabled suricata, disabled pfblockerng and relaod filters... to no avail, so I feel I'm out of control of my legitimate traffic...
      The only way to resume traffic is rebooting  :-\ ...very ugly...

      Could you point me how this should be done elegantly?!?!
      Or should I declare a bug/feature request?

      Thank you very much guys!

      1 Reply Last reply Reply Quote 0
      • A
        alexolivan
        last edited by

        Got it partially…. I'm a f...ng noob!!!!  :-[

        Diagnostics -> Tables and got it removed...

        The problem is how to avoid my legitimate IPs ending there...
        I have set  suppress list in pfblocker and pass list in suricata with my IPs.

        Either I did something wrong creating my lists or they are ignored...
        Anyhow I feel controlling all this is very obscure when comparing with "normal" GUI ruling/NAT.

        1 Reply Last reply Reply Quote 0
        • bmeeksB
          bmeeks
          last edited by

          When you created your Pass List, did you then go to the INTERFACE SETTINGS tab for the Suricata interface and "assign" the new Pass List to the interface?  You have to select the Pass List by name from the drop-down box for PASS LIST.  After selecting and saving the change, you must restart Suricata on the interface.

          Also, you cannot use FQDN aliases in a Pass List.  They will be ignored as neither Suricata nor Snort currently support them.

          Bill

          1 Reply Last reply Reply Quote 0
          • A
            alexolivan
            last edited by

            …Aha....

            Let's do it!
            will report results...

            Thank you very much!

            1 Reply Last reply Reply Quote 0
            • A
              alexolivan
              last edited by

              Effectively that part was missing…

              The problem but is when users do have dynamic IPs assigned by ISPs... it is impossible to track them or assign them to a white list, as they're dynamic...

              But what makes me worry is the feel of no control... the only trace I have is a crude entry on the syslog firewall pointing to snort.2c table as block reason.
              My pfblocker or suricata logs do not claim those IPs as alert/blocks... so it is simple and crude firewall block by the sole fact of belonging to snort.2c table... and I do not know what makes an IP to enter this table...

              Could you please explain what this table is?

              Thank you very much!

              1 Reply Last reply Reply Quote 0
              • P
                pfcode
                last edited by

                @alexolivan:

                Effectively that part was missing…

                The problem but is when users do have dynamic IPs assigned by ISPs... it is impossible to track them or assign them to a white list, as they're dynamic...

                But what makes me worry is the feel of no control... the only trace I have is a crude entry on the syslog firewall pointing to snort.2c table as block reason.
                My pfblocker or suricata logs do not claim those IPs as alert/blocks... so it is simple and crude firewall block by the sole fact of belonging to snort.2c table... and I do not know what makes an IP to enter this table...

                Could you please explain what this table is?

                Thank you very much!

                I think they were from the SNORT/Suricata Blocked List, if you turn the 'Block Offenders' on.

                Release: pfSense 2.4.3(amd64)
                M/B: Supermicro A1SRi-2558F
                HDD: Intel X25-M 160G
                RAM: 2x8Gb Kingston ECC ValueRAM
                AP: Netgear R7000 (XWRT), Unifi AC Pro

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.