Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Ways to improve IDS performance in PfSense?

    Scheduled Pinned Locked Moved IDS/IPS
    9 Posts 3 Posters 3.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • W
      weet9342
      last edited by

      Hello everyone,

      I'm testing both SNORT and Suricata on my PfSense, and i'm trying to figure out which one will work best in my home network. Currently i want to see if i can improve their performance without reducing their detection capabilities.

      I've tried to disable some rules, and also some rule categories that i dont really need, but it didn't improve anything in SNORT or Suricata.

      I'm wondering that if i want to improve their performance, the best way is to improve my Pfsense machine, and not trying to tune SNORT or Suricata to handle better (by better i mean with lower impact in bandwidth and usage of processor).

      Can someone give me tips on this please? I'm fairly new to IDS.

      Thanks in advance

      1 Reply Last reply Reply Quote 0
      • S
        SteveITS Galactic Empire
        last edited by

        If you put it on the LAN side it won't scan packets that will be blocked by the firewall anyway.

        What sort of performance impact are you seeing? What CPU do you have?

        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
        Upvote 👍 helpful posts!

        1 Reply Last reply Reply Quote 1
        • W
          weet9342
          last edited by

          Hello teamits,

          For now i have an IDS scanning in 2 vlans, should i change that? It seems to be working fine.

          my CPU is a Intel Xeon 3.4ghz, and for the record, i'm not trying to do this because i'm having issues, i'm trying to understand which will use less CPU, which one will work best, using the less resources.

          I was wondering if the main thing impacting the CPU usage was the package of an IDS (SNORT or Suricata) or was the rules that they use

          1 Reply Last reply Reply Quote 0
          • S
            SteveITS Galactic Empire
            last edited by

            I don't have an answer for you. Neither should be anywhere close to an issue on a Xeon though. :) If I had to guess I would say the rules, since the matching is probably about the same but the choice of 5000 vs 100000 rules would make more difference. In any case I doubt it will be noticeable unless you have a very high speed connection.

            In terms of what to scan, I would scan untrusted traffic. I was just saying that if it is scanning the WAN, that happens before the packets get blocked or allowed by the firewall.

            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
            Upvote 👍 helpful posts!

            W 1 Reply Last reply Reply Quote 1
            • W
              weet9342 @SteveITS
              last edited by

              @teamits, thanks for the heal, i really appreciate it.

              I'm not having any issues in my CPU, i just want to optimize it. But yes, i've been disabling some rules and some rulesets and no noticeable improvement was found, so, i'm thinking that there is not much i can do.

              Anyway, thank you so much for your help, really really appreciate that :)

              1 Reply Last reply Reply Quote 0
              • NogBadTheBadN
                NogBadTheBad
                last edited by NogBadTheBad

                @weet9342 said in Ways to improve IDS performance in PfSense?:

                ello teamits,
                For now i have an IDS scanning in 2 vlans, should i change that? It seems to be working fine.
                my CPU is a Intel Xeon 3.4ghz, and for the record, i'm not trying to do this because i'm having issues, i'm trying to understand which will use less CPU, which one will work best, using the less resources.
                I was wondering if the main thing impactin

                Leave it scanning on your VLANS, if you have an infected machine on your LAN its easier to spot.

                Have you just enabled every rule ?

                I have snort running on a Netgate SG-4860 1 x WAN & 6 x VLAN, the CPU doesn't hit more that 12%

                Andy

                1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                W 1 Reply Last reply Reply Quote 1
                • W
                  weet9342 @NogBadTheBad
                  last edited by

                  @nogbadthebad

                  Yes, for now, i have every ruleset enabled, but i'll change that since some rulesets aren't needed.

                  And yeah, i'm not having CPU issues, i just wanted to understand what i could do in order to improve performance.

                  Out of curiosity, have you tried Suricata? If so, what made you change to SNORT?

                  1 Reply Last reply Reply Quote 0
                  • NogBadTheBadN
                    NogBadTheBad
                    last edited by NogBadTheBad

                    Every ruleset will be an issue, why check every rule set when you don't run the protocol.

                    Never tried Suricata, Snort works fine for me and when v3.0 is released it should be multi threaded.

                    https://forum.netgate.com/topic/128480/how-automatic-sid-management-and-user-rule-overrides-work-in-snort-and-suricata

                    I use IPS Policy Balanced.

                    Andy

                    1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                    1 Reply Last reply Reply Quote 1
                    • W
                      weet9342
                      last edited by

                      I had every rule set checked just for testing purposes. But now i will check out if changing IPS policy will do a big improvement in my network. Thank you so much for your help, cheers!

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.