Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    SG3100 limitations

    Official Netgate® Hardware
    6
    52
    7.4k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      Burner27
      last edited by

      Hello, I recently purchased an SG3100. My plan is to run pFBlockerNG-dev, SNORT, and something to do Content Filtering (Is that Squid/Squidguard?)
      Just wondering if the SG3100 has enough horsepower to run those three? I am not really sure if I need to run SNORT as I am not hosting anything behind the SG3100. Your thoughts and advice are very much appreciated.

      Thank you

      1 Reply Last reply Reply Quote 0
      • bmeeksB
        bmeeks
        last edited by bmeeks

        Putting all those packages on an SG-3100 is going to make it "sweat hard", mostly due to the amount of RAM those packages will want (Snort and Squid/squidGuard, in particular).

        If you've never run an IDS/IPS such as Snort before, I don't recommend you install it and immediately turn on blocking mode. Doing so will lead to much frustration and a non-functional or semi-functional network. Most home users can do without an IDS/IPS. It takes a significant amount of skills and knowledge about network security and attack surfaces and applicable threats to manage an IDS/IPS.

        Unless you do man-in-the-middle (MITM) SSL interception, you will find a package like Squid loses a lot its effectiveness now that so very much of web traffic is SSL encrypted. So I would question using Squid or even squidGuard. You can do quite effective content-filtering with pfBlockerNG-dev and the right IP lists and DNSBL.

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Yes, I second that suggestion. I would start out running pfBlockerNG(dev) only and using DNS-BL for content filtering. You will probably find that is sufficient for everything you need.

          It's possible to run those packages on the SG-3100, all at the same time even, but you would need to tune them carefully. You cannot just enable everything in the RAM on the SG-3100.

          Steve

          1 Reply Last reply Reply Quote 0
          • B
            Burner27
            last edited by Burner27

            Thank you both for the suggestions and advice. I really do appreciate it. I need to look into how to do the content filter based on categories (pr0n, news, social media, etc). The SG3100 is being used in a home environment for now, and I want to prevent my children from going to places they shouldnt be going to. I believe i have to enable DNSBL Category?

            A 1 Reply Last reply Reply Quote 0
            • A
              akuma1x @Burner27
              last edited by

              @Burner27 You could do the blocking really easy by just using the OpenDNS family shield servers. It basically sends all your DNS lookups through a safe filtering system. It’s not 100% foolproof, but it’s a good first start to content filtering. If you find it not sufficient, then you can throw other tools at this project.

              1 Reply Last reply Reply Quote 1
              • B
                Burner27
                last edited by

                Is SNORT even needed for a home user?

                A bmeeksB 2 Replies Last reply Reply Quote 0
                • A
                  akuma1x @Burner27
                  last edited by

                  @Burner27 said in SG3100 limitations:

                  Is SNORT even needed for a home user?

                  Usually not, it's more if you're running internal services (servers) you need to share with the world.

                  It can be used at home, but it needs a lot of tuning. See here, it's a little bit old, but still applies:

                  https://www.reddit.com/r/PFSENSE/comments/5fjexm/is_snort_needed_for_a_home_connection/

                  Jeff

                  1 Reply Last reply Reply Quote 0
                  • B
                    Burner27
                    last edited by

                    What packages do you recommend for home users?

                    A 1 Reply Last reply Reply Quote 0
                    • A
                      akuma1x @Burner27
                      last edited by

                      @Burner27 I would recommend the following:

                      NUT, so you can hookup a UPS battery to keep the firewall protected thru power outages.

                      And, if you want to access your internal LAN networks from outside, put in the OpenVPN Client Export package, so it's really easy to export your VPN server settings to your devices.

                      That's kinda all you need. There's some fringy stuff, like avahi, bandwidthd, and squid, but those are for special use kinds of things. Keep it simple and don't go crazy installing all kinds of packages because they sound cool, or you think you might need them.

                      Hope that helps.

                      Jeff

                      B 1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        I would agree it usually is not. Certainly not in blocking mode. It can be useful for analysing what's happening in your network but that is better done by exporting the logs to something dedicated to that and that's beyond most home setups.

                        If you're hosting anything that is publicly accessible it's nice to have. But you might argue anything hosted at home is better strictly limited to known external clients anyway.

                        Steve

                        1 Reply Last reply Reply Quote 0
                        • bmeeksB
                          bmeeks @Burner27
                          last edited by

                          @Burner27 said in SG3100 limitations:

                          Is SNORT even needed for a home user?

                          I maintain that package, and I created the Suricata package, so you might expect my answer to be "yes". But actually my answer is usually "no" for the same reasons given by @stephenw10.

                          If you are interested in learning about IDS/IPS and want to put in the time and study required to be proficient in the art, then certainly Snort or Suricata can be a useful tool for that purpose. But for the general home user, such packages are usually more trouble than they are worth in security due to the prevalence of false positives causing network interruptions when blocking is enabled.

                          If you just want to see if anything weird is happening in your network, you could install one of the IDS/IPS packages and operate it in detection-only mode (no blocking). Then for each alert you could go check results at Google University (that is, do a Google search on the alert and see what others are saying about it) ... 😉.

                          B 1 Reply Last reply Reply Quote 0
                          • B
                            Burner27 @akuma1x
                            last edited by

                            @akuma1x the only thing I have installed is pfblockerNG-dev for content filtering/ad blocking etc....

                            The only thing I have publicly accessible is a Minecraft server.

                            1 Reply Last reply Reply Quote 0
                            • B
                              Burner27 @bmeeks
                              last edited by

                              @bmeeks I tried suricata and snort. I like snort better but it caused random reboots even if it was the only thing I installed. May have been the way it was configured but I followed this: https://www.youtube.com/watch?v=-GgqYq5-EBg
                              Not sure if there is anything in that tutorial you find to be incorrect, but I am new to Snort. I followed your basic setup and for about a week it didn’t cause any reboots, but then I started this thread and you guys advised me it isn’t necessary. I trust your advice. Perhaps I had too many thing enabled?

                              bmeeksB 1 Reply Last reply Reply Quote 0
                              • bmeeksB
                                bmeeks @Burner27
                                last edited by bmeeks

                                @Burner27 said in SG3100 limitations:

                                @bmeeks I tried suricata and snort. I like snort better but it caused random reboots even if it was the only thing I installed. May have been the way it was configured but I followed this: https://www.youtube.com/watch?v=-GgqYq5-EBg
                                Not sure if there is anything in that tutorial you find to be incorrect, but I am new to Snort. I followed your basic setup and for about a week it didn’t cause any reboots, but then I started this thread and you guys advised me it isn’t necessary. I trust your advice. Perhaps I had too many thing enabled?

                                I don't recall any previous reports where the installation of Snort caused any reboots. Are you 100% sure Snort is the cause of the reboot? What is shown in the pfSense system log at the time just before the reboot happens?

                                By the way, that video from Lawrence Systems is excellent. The only change I suggest for home users is to put Snort on the LAN and not the WAN. This is because out-of-the-box pfSense blocks all inbound traffic on the WAN already. So there is no sense in having Snort block something the firewall is already going to block inbound. There is also the problem of Snort logging all the typical WAN "noise" that any Internet-facing interface sees. Another aggravation with Snort on the WAN is that all the local addresses in alerts from your LAN will show up in Snort as having your WAN's public IP due to NAT. Snort on the WAN sees outbound traffic (to the Internet) after NAT is applied, and it sees inbound traffic (from the Internet) before NAT is undone. Thus all local hosts always show as having the firewall's WAN public IP. That makes it hard to find which local host might have an issue. Putting Snort on the LAN interface solves these issues. Plus, on the LAN interface, all traffic from your LAN coming from or going to the Internet must pass through Snort. So you still have the same level of "security".

                                T 1 Reply Last reply Reply Quote 1
                                • B
                                  Burner27
                                  last edited by

                                  I have the log file I can send you if you want.

                                  bmeeksB 1 Reply Last reply Reply Quote 0
                                  • bmeeksB
                                    bmeeks @Burner27
                                    last edited by

                                    @Burner27 said in SG3100 limitations:

                                    I have the log file I can send you if you want.

                                    Just post the relevant section here in this thread. After pasting in the log content, highlight all of it with your mouse in the "posting" textbox and then click the "code" icon in the list of editor icons. That icon is the pair of brackets "</>". That will format the block of log text and make it easier to read.

                                    1 Reply Last reply Reply Quote 0
                                    • B
                                      Burner27
                                      last edited by

                                      ul 10 13:33:51 ProfessorX php: /etc/rc.packages: [Snort] Checking configuration settings version...
                                      Jul 10 13:33:51 ProfessorX php: /etc/rc.packages: [Snort] Configuration version is current...
                                      Jul 10 13:33:51 ProfessorX php: /etc/rc.packages: [Snort] Downloading and updating configured rule sets.
                                      Jul 10 13:34:01 ProfessorX php: /etc/rc.packages: [Snort] There is a new set of Snort Subscriber rules posted. Downloading snortrules-snapshot-29160.tar.gz...
                                      Jul 10 13:34:14 ProfessorX php: /etc/rc.packages: [Snort] Snort Subscriber rules file update downloaded successfully
                                      Jul 10 13:34:16 ProfessorX php: /etc/rc.packages: [Snort] There is a new set of Snort OpenAppID detectors posted. Downloading snort-openappid.tar.gz...
                                      Jul 10 13:34:16 ProfessorX php: /etc/rc.packages: [Snort] Snort OpenAppID detectors file update downloaded successfully
                                      Jul 10 13:34:17 ProfessorX php: /etc/rc.packages: [Snort] There is a new set of Snort OpenAppID RULES detectors posted. Downloading appid_rules.tar.gz...
                                      Jul 10 13:34:17 ProfessorX php: /etc/rc.packages: [Snort] Snort OpenAppID RULES detectors file update downloaded successfully
                                      Jul 10 13:34:17 ProfessorX php: /etc/rc.packages: [Snort] There is a new set of Snort GPLv2 Community Rules posted. Downloading community-rules.tar.gz...
                                      Jul 10 13:34:18 ProfessorX php: /etc/rc.packages: [Snort] Snort GPLv2 Community Rules file update downloaded successfully
                                      Jul 10 13:34:18 ProfessorX php: /etc/rc.packages: [Snort] There is a new set of Emerging Threats Open rules posted. Downloading emerging.rules.tar.gz...
                                      Jul 10 13:34:19 ProfessorX php: /etc/rc.packages: [Snort] Emerging Threats Open rules file update downloaded successfully
                                      Jul 10 13:34:45 ProfessorX php: /etc/rc.packages: [Snort] Hide Deprecated Rules is enabled.  Removing obsoleted rules categories.
                                      Jul 10 13:34:45 ProfessorX php: /etc/rc.packages: [Snort] Removed 49 obsoleted rules category files.
                                      Jul 10 13:34:45 ProfessorX php: /etc/rc.packages: [Snort] The Rules update has finished.
                                      Jul 10 13:34:45 ProfessorX php: /etc/rc.packages: [Snort] Updating rules configuration for: LAN ...
                                      Jul 10 13:34:50 ProfessorX php: /etc/rc.packages: [Snort] Checking for rules dependent on disabled preprocessors for: LAN...
                                      Jul 10 13:34:50 ProfessorX php: /etc/rc.packages: [Snort] Enabling any flowbit-required rules for: LAN...
                                      Jul 10 13:34:50 ProfessorX php: /etc/rc.packages: [Snort] Checking flowbit rules dependent on disabled preprocessors for: LAN...
                                      Jul 10 13:34:50 ProfessorX php: /etc/rc.packages: [Snort] Building new sid-msg.map file for LAN...
                                      Jul 10 13:34:50 ProfessorX check_reload_status: Syncing firewall
                                      Jul 10 13:34:50 ProfessorX check_reload_status: Syncing firewall
                                      Jul 10 13:34:51 ProfessorX php: /etc/rc.packages: [Snort] Finished rebuilding installation from saved settings.
                                      Jul 10 13:34:51 ProfessorX php: /etc/rc.packages: [Snort] Package post-installation tasks completed...
                                      Jul 10 13:34:51 ProfessorX php: /etc/rc.packages: Successfully installed package: snort.
                                      Jul 10 13:34:51 ProfessorX pkg-static: pfSense-pkg-snort-3.2.9.13 installed
                                      Jul 10 13:34:52 ProfessorX check_reload_status: Reloading filter
                                      Jul 10 13:34:52 ProfessorX check_reload_status: Starting packages
                                      Jul 10 13:34:53 ProfessorX php-fpm[61390]: /rc.start_packages: Restarting/Starting all packages.
                                      Jul 10 13:34:54 ProfessorX SnortStartup[84661]: Snort START for LAN(44407_mvneta1)...
                                      Jul 10 13:34:55 ProfessorX snort[85976]: AppId
                                      Jul 10 13:34:55 ProfessorX snort[85976]: AppId
                                      Jul 10 13:34:55 ProfessorX snort[85976]: AppId
                                      Jul 10 13:34:55 ProfessorX snort[85976]: AppId
                                      Jul 10 13:34:55 ProfessorX php: [pfBlockerNG] DNSBL parser daemon started
                                      Jul 10 13:34:55 ProfessorX php_pfb: [pfBlockerNG] filterlog daemon started
                                      Jul 10 13:34:56 ProfessorX snort[85976]: AppId
                                      Jul 10 13:34:56 ProfessorX snort[85976]: AppId
                                      Jul 10 13:34:56 ProfessorX snort[85976]: AppId
                                      Jul 10 13:34:56 ProfessorX snort[85976]: AppId
                                      Jul 10 13:35:02 ProfessorX kernel: mvneta1: promiscuous mode enabled
                                      Jul 10 13:40:28 ProfessorX check_reload_status: Syncing firewall
                                      Jul 10 13:40:54 ProfessorX check_reload_status: Syncing firewall
                                      Jul 10 13:48:31 ProfessorX php-fpm[61390]: /index.php: User logged out for user 'admin' from: 192.168.1.145 (Local Database)
                                      Jul 10 14:00:00 ProfessorX php: [pfBlockerNG] Starting cron process.
                                      Jul 10 14:00:28 ProfessorX php: [pfBlockerNG] No changes to Firewall rules, skipping Filter Reload
                                      Jul 10 14:29:29 ProfessorX syslogd: kernel boot file is /boot/kernel/kernel
                                      Jul 10 14:29:29 ProfessorX kernel: Copyright (c) 1992-2020 The FreeBSD Project.
                                      Jul 10 14:29:29 ProfessorX kernel: Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
                                      Jul 10 14:29:29 ProfessorX kernel: 	The Regents of the University of California. All rights reserved.
                                      Jul 10 14:29:29 ProfessorX kernel: FreeBSD is a registered trademark of The FreeBSD Foundation.
                                      Jul 10 14:29:29 ProfessorX kernel: FreeBSD 11.3-STABLE #238 885b1ed26b6(factory-RELENG_2_4_5): Tue Jun  2 17:52:40 EDT 2020
                                      Jul 10 14:29:29 ProfessorX kernel:     root@buildbot1-nyi.netgate.com:/build/factory-crossbuild-245-armv6/obj/armv6/kJlGauaG/arm.armv6/build/factory-crossbuild-245-armv6/sources/FreeBSD-src/sys/pfSense-SG-3100 arm
                                      Jul 10 14:29:29 ProfessorX kernel: FreeBSD clang version 8.0.1 (tags/RELEASE_801/final 366581) (based on LLVM 8.0.1)
                                      Jul 10 14:29:29 ProfessorX kernel: CPU: ARM Cortex-A9 r4p1 (ECO: 0x00000000)
                                      Jul 10 14:29:29 ProfessorX kernel: CPU Features: 
                                      Jul 10 14:29:29 ProfessorX kernel:   Multiprocessing, Thumb2, Security, VMSAv7, Coherent Walk
                                      Jul 10 14:29:29 ProfessorX kernel: Optional instructions: 
                                      Jul 10 14:29:29 ProfessorX kernel:   UMULL, SMULL, SIMD(ext)
                                      Jul 10 14:29:29 ProfessorX kernel: LoUU:2 LoC:2 LoUIS:2 
                                      Jul 10 14:29:29 ProfessorX kernel: Cache level 1:
                                      Jul 10 14:29:29 ProfessorX kernel:  32KB/32B 4-way data cache WB Read-Alloc Write-Alloc
                                      Jul 10 14:29:29 ProfessorX kernel:  32KB/32B 4-way instruction cache Read-Alloc
                                      Jul 10 14:29:29 ProfessorX kernel: real memory  = 2147479552 (2047 MB)
                                      Jul 10 14:29:29 ProfessorX kernel: avail memory = 2073812992 (1977 MB)
                                      Jul 10 14:29:29 ProfessorX kernel: SOC: Marvell 88F6820, TClock 250MHz, Frequency 1600MHz
                                      Jul 10 14:29:29 ProfessorX kernel:   Instruction cache prefetch enabled, data cache prefetch disabled
                                      Jul 10 14:29:29 ProfessorX kernel: FreeBSD/SMP: Multiprocessor System Detected: 2 CPUs
                                      Jul 10 14:29:29 ProfessorX kernel: wlan: mac acl policy registered
                                      Jul 10 14:29:29 ProfessorX kernel: random: entropy device external interface
                                      Jul 10 14:29:29 ProfessorX kernel: ipw_ibss: You need to read the LICENSE file in /usr/share/doc/legal/intel_ipw.LICENSE.
                                      Jul 10 14:29:29 ProfessorX kernel: ipw_ibss: If you agree with the license, set legal.intel_ipw.license_ack=1 in /boot/loader.conf.
                                      Jul 10 14:29:29 ProfessorX kernel: module_register_init: MOD_LOAD (ipw_ibss_fw, 0xc0135c50, 0) error 1
                                      Jul 10 14:29:29 ProfessorX kernel: ipw_monitor: You need to read the LICENSE file in /usr/share/doc/legal/intel_ipw.LICENSE.
                                      Jul 10 14:29:29 ProfessorX kernel: ipw_monitor: If you agree with the license, set legal.intel_ipw.license_ack=1 in /boot/loader.conf.
                                      Jul 10 14:29:29 ProfessorX kernel: module_register_init: MOD_LOAD (ipw_monitor_fw, 0xc0135d00, 0) error 1
                                      Jul 10 14:29:29 ProfessorX kernel: iwi_bss: You need to read the LICENSE file in /usr/share/doc/legal/intel_iwi.LICENSE.
                                      Jul 10 14:29:29 ProfessorX kernel: iwi_bss: If you agree with the license, set legal.intel_iwi.license_ack=1 in /boot/loader.conf.
                                      Jul 10 14:29:29 ProfessorX kernel: module_register_init: MOD_LOAD (iwi_bss_fw, 0xc013f1ec, 0) error 1
                                      Jul 10 14:29:29 ProfessorX kernel: iwi_ibss: You need to read the LICENSE file in /usr/share/doc/legal/intel_iwi.LICENSE.
                                      Jul 10 14:29:29 ProfessorX kernel: iwi_ibss: If you agree with the license, set legal.intel_iwi.license_ack=1 in /boot/loader.conf.
                                      Jul 10 14:29:29 ProfessorX kernel: module_register_init: MOD_LOAD (iwi_ibss_fw, 0xc013f29c, 0) error 1
                                      Jul 10 14:29:29 ProfessorX kernel: iwi_monitor: You need to read the LICENSE file in /usr/share/doc/legal/intel_iwi.LICENSE.
                                      Jul 10 14:29:29 ProfessorX kernel: iwi_monitor: If you agree with the license, set legal.intel_iwi.license_ack=1 in /boot/loader.conf.
                                      Jul 10 14:29:29 ProfessorX kernel: module_register_init: MOD_LOAD (iwi_monitor_fw, 0xc013f34c, 0) error 1
                                      Jul 10 14:29:29 ProfessorX kernel: ipw_bss: You need to read the LICENSE file in /usr/share/doc/legal/intel_ipw.LICENSE.
                                      Jul 10 14:29:29 ProfessorX kernel: ipw_bss: If you agree with the license, set legal.intel_ipw.license_ack=1 in /boot/loader.conf.
                                      Jul 10 14:29:29 ProfessorX kernel: module_register_init: MOD_LOAD (ipw_bss_fw, 0xc0135ba0, 0) error 1
                                      Jul 10 14:29:29 ProfessorX kernel: ofwbus0: <Open Firmware Device Tree>
                                      Jul 10 14:29:29 ProfessorX kernel: simplebus0: <Flattened device tree simple bus> on ofwbus0
                                      Jul 10 14:29:29 ProfessorX kernel: simplebus1: <Flattened device tree simple bus> on simplebus0
                                      Jul 10 14:29:29 ProfessorX kernel: l2cache0: <PL310 L2 cache controller> mem 0x8000-0x8fff on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: l2cache0: cannot allocate IRQ, not using interrupt
                                      Jul 10 14:29:29 ProfessorX kernel: l2cache0: Part number: 0x3, release: 0x9
                                      Jul 10 14:29:29 ProfessorX kernel: l2cache0: L2 Cache enabled: 1024KB/32B 16 ways
                                      Jul 10 14:29:29 ProfessorX kernel: gic0: <ARM Generic Interrupt Controller> mem 0xd000-0xdfff,0xc100-0xc1ff on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: gic0: pn 0x390, arch 0x1, rev 0x2, implementer 0x43b irqs 192
                                      Jul 10 14:29:29 ProfessorX kernel: mpic0: <Marvell Integrated Interrupt Controller> mem 0x20a00-0x20ccf,0x21870-0x21b6f irq 19 on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: mp_tmr0: <ARM MPCore Timers> mem 0xc200-0xc21f irq 3 on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: Timecounter "MPCore" frequency 800000000 Hz quality 800
                                      Jul 10 14:29:29 ProfessorX kernel: mp_tmr1: <ARM MPCore Timers> mem 0xc600-0xc61f irq 4 on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: Event timer "MPCore" frequency 800000000 Hz quality 1000
                                      Jul 10 14:29:29 ProfessorX kernel: cesa0: <Marvell Cryptographic Engine and Security Accelerator> mem 0x90000-0x90fff,0x9d000-0x9dfff irq 1 on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: cesa1: <Marvell Cryptographic Engine and Security Accelerator> mem 0x92000-0x92fff,0x9f000-0x9ffff irq 2 on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: spi0: <Marvell SPI controller> mem 0x10600-0x1064f irq 5 on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: twsi0: <Marvell Integrated I2C Bus Controller> mem 0x11000-0x1101f irq 7 on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: iicbus0: <OFW I2C bus> on twsi0
                                      Jul 10 14:29:29 ProfessorX kernel: iic0: <I2C generic I/O> on iicbus0
                                      Jul 10 14:29:29 ProfessorX kernel: gpio0: <NXP PCA9552 LED driver> at addr 0xc0 on iicbus0
                                      Jul 10 14:29:29 ProfessorX kernel: device_attach: gpio0 attach returned 6
                                      Jul 10 14:29:29 ProfessorX kernel: gpio0: <ISSI IS31FL3199 9 channel light effect LED driver> at addr 0xce on iicbus0
                                      Jul 10 14:29:29 ProfessorX kernel: gpiobus0: <OFW GPIO bus> on gpio0
                                      Jul 10 14:29:29 ProfessorX kernel: gpioc0: <GPIO controller> on gpio0
                                      Jul 10 14:29:29 ProfessorX kernel: gpio1: <NXP PCA9552 LED driver> at addr 0xc0 on iicbus0
                                      Jul 10 14:29:29 ProfessorX kernel: device_attach: gpio1 attach returned 6
                                      Jul 10 14:29:29 ProfessorX kernel: uart0: <Non-standard ns8250 class UART with FIFOs> mem 0x12000-0x120ff irq 9 on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: uart0: console (-1,n,8,1)
                                      Jul 10 14:29:29 ProfessorX kernel: uart1: <16550 or compatible> mem 0x12100-0x121ff irq 10 on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: timer0: <Marvell CPU Timer> mem 0x20300-0x20333,0x20704-0x20707,0x18260-0x18263 on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: timer0: only watchdog attached
                                      Jul 10 14:29:29 ProfessorX kernel: pmsu0: <Power Management Service Unit> mem 0x22000-0x22fff on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: mvneta0: <NETA controller> mem 0x30000-0x33fff irq 26 on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: mvneta0: version is 10
                                      Jul 10 14:29:29 ProfessorX kernel: mvneta0: Ethernet address: 00:08:a2:10:f2:18
                                      Jul 10 14:29:29 ProfessorX kernel: miibus0: <MII bus> on mvneta0
                                      Jul 10 14:29:29 ProfessorX kernel: mv88e151x0: <Marvell 88E1512 Gigabit PHY> PHY 1 on miibus0
                                      Jul 10 14:29:29 ProfessorX kernel: mv88e151x0:  none, 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseT, 1000baseT-master, 1000baseT-FDX, 1000baseT-FDX-master, 1000baseSX, 1000baseSX-FDX, auto
                                      Jul 10 14:29:29 ProfessorX kernel: mvneta1: <NETA controller> mem 0x34000-0x37fff irq 27 on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: mvneta1: version is 10
                                      Jul 10 14:29:29 ProfessorX kernel: mvneta1: Ethernet address: 00:08:a2:10:f2:19
                                      Jul 10 14:29:29 ProfessorX kernel: mdio0: <MDIO> on mvneta1
                                      Jul 10 14:29:29 ProfessorX kernel: e6000sw0: <Marvell 88E6141> on mdio0
                                      Jul 10 14:29:29 ProfessorX kernel: e6000sw0: single-chip addressing mode
                                      Jul 10 14:29:29 ProfessorX kernel: e6000sw0: PHY at port 1
                                      Jul 10 14:29:29 ProfessorX kernel: miibus1: <MII bus> on e6000sw0
                                      Jul 10 14:29:29 ProfessorX kernel: e1000phy0: <Marvell 88E1000 Gigabit PHY> PHY 17 on miibus1
                                      Jul 10 14:29:29 ProfessorX kernel: e1000phy0:  none, 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseT, 1000baseT-master, 1000baseT-FDX, 1000baseT-FDX-master, auto
                                      Jul 10 14:29:29 ProfessorX kernel: e6000sw0: PHY at port 2
                                      Jul 10 14:29:29 ProfessorX kernel: miibus2: <MII bus> on e6000sw0
                                      Jul 10 14:29:29 ProfessorX kernel: e1000phy1: <Marvell 88E1000 Gigabit PHY> PHY 18 on miibus2
                                      Jul 10 14:29:29 ProfessorX kernel: e1000phy1:  none, 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseT, 1000baseT-master, 1000baseT-FDX, 1000baseT-FDX-master, auto
                                      Jul 10 14:29:29 ProfessorX kernel: e6000sw0: PHY at port 3
                                      Jul 10 14:29:29 ProfessorX kernel: miibus3: <MII bus> on e6000sw0
                                      Jul 10 14:29:29 ProfessorX kernel: e1000phy2: <Marvell 88E1000 Gigabit PHY> PHY 19 on miibus3
                                      Jul 10 14:29:29 ProfessorX kernel: e1000phy2:  none, 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseT, 1000baseT-master, 1000baseT-FDX, 1000baseT-FDX-master, auto
                                      Jul 10 14:29:29 ProfessorX kernel: e6000sw0: PHY at port 4
                                      Jul 10 14:29:29 ProfessorX kernel: miibus4: <MII bus> on e6000sw0
                                      Jul 10 14:29:29 ProfessorX kernel: e1000phy3: <Marvell 88E1000 Gigabit PHY> PHY 20 on miibus4
                                      Jul 10 14:29:29 ProfessorX kernel: e1000phy3:  none, 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseT, 1000baseT-master, 1000baseT-FDX, 1000baseT-FDX-master, auto
                                      Jul 10 14:29:29 ProfessorX kernel: e6000sw0: CPU port at 5
                                      Jul 10 14:29:29 ProfessorX kernel: e6000sw0: fixed port at 5
                                      Jul 10 14:29:29 ProfessorX kernel: e6000sw0: switch is ready.
                                      Jul 10 14:29:29 ProfessorX kernel: etherswitch0: <Switch controller> on e6000sw0
                                      Jul 10 14:29:29 ProfessorX kernel: ehci0: <Marvell Integrated USB 2.0 controller> mem 0x58000-0x584ff irq 28 on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: usbus0: EHCI version 1.0
                                      Jul 10 14:29:29 ProfessorX kernel: usbus0 on ehci0
                                      Jul 10 14:29:29 ProfessorX kernel: mvneta2: <NETA controller> mem 0x70000-0x73fff irq 29 on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: mvneta2: version is 10
                                      Jul 10 14:29:29 ProfessorX kernel: mvneta2: Ethernet address: 00:08:a2:10:f2:1a
                                      Jul 10 14:29:29 ProfessorX kernel: miibus5: <MII bus> on mvneta2
                                      Jul 10 14:29:29 ProfessorX kernel: mv88e151x1: <Marvell 88E1512 Gigabit PHY> PHY 0 on miibus5
                                      Jul 10 14:29:29 ProfessorX kernel: mv88e151x1:  none, 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseT, 1000baseT-master, 1000baseT-FDX, 1000baseT-FDX-master, 1000baseSX, 1000baseSX-FDX, auto
                                      Jul 10 14:29:29 ProfessorX kernel: rtc0: <Marvell Integrated RTC> mem 0xa3800-0xa381f,0x184a0-0x184ab irq 30 on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: rtc0: registered as a time-of-day clock, resolution 1.000000s
                                      Jul 10 14:29:29 ProfessorX kernel: ahci0: <Marvell AHCI Controller> mem 0xa8000-0xa9fff irq 31 on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: ahci0: AHCI v1.00 with 2 6Gbps ports, Port Multiplier supported with FBS
                                      Jul 10 14:29:29 ProfessorX kernel: ahci0: quirks=0x200010<2CH,MRVL_SR_DEL>
                                      Jul 10 14:29:29 ProfessorX kernel: ahcich0: <AHCI channel> at channel 0 on ahci0
                                      Jul 10 14:29:29 ProfessorX kernel: ahcich1: <AHCI channel> at channel 1 on ahci0
                                      Jul 10 14:29:29 ProfessorX kernel: armada_thermal0: <Armada380 Thermal Control> mem 0xe4078-0xe407b,0xe4074-0xe4077 on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: sdhci_fdt0: <ARMADA38X SDHCI controller> mem 0xd8000-0xd8fff,0xdc000-0xdc0ff,0x18454-0x18457 irq 34 on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: sdhci_fdt0: 1 slot(s) allocated
                                      Jul 10 14:29:29 ProfessorX kernel: xhci0: <Marvell Integrated USB 3.0 controller> mem 0xf8000-0xfbfff,0xfc000-0xfffff irq 36 on simplebus1
                                      Jul 10 14:29:29 ProfessorX kernel: xhci0: 32 bytes context size, 32-bit DMA
                                      Jul 10 14:29:29 ProfessorX kernel: usbus1 on xhci0
                                      Jul 10 14:29:29 ProfessorX kernel: pcib_ctrl0: <Marvell Integrated PCIe Bus Controller> on simplebus0
                                      Jul 10 14:29:29 ProfessorX kernel: pcib0: <Marvell Integrated PCI/PCI-E Controller> on pcib_ctrl0
                                      Jul 10 14:29:29 ProfessorX kernel: pci0: <PCI bus> on pcib0
                                      Jul 10 14:29:29 ProfessorX kernel: pcib1: <Marvell Integrated PCI/PCI-E Controller> on pcib_ctrl0
                                      Jul 10 14:29:29 ProfessorX kernel: pci1: <PCI bus> on pcib1
                                      Jul 10 14:29:29 ProfessorX kernel: pcib2: <Marvell Integrated PCI/PCI-E Controller> on pcib_ctrl0
                                      Jul 10 14:29:29 ProfessorX kernel: pci2: <PCI bus> on pcib2
                                      Jul 10 14:29:29 ProfessorX kernel: pcib3: <Marvell Integrated PCI/PCI-E Controller> on pcib_ctrl0
                                      Jul 10 14:29:29 ProfessorX kernel: pci3: <PCI bus> on pcib3
                                      Jul 10 14:29:29 ProfessorX kernel: cpulist0: <Open Firmware CPU Group> on ofwbus0
                                      Jul 10 14:29:29 ProfessorX kernel: cpu0: <Open Firmware CPU> on cpulist0
                                      Jul 10 14:29:29 ProfessorX kernel: cpu1: <Open Firmware CPU> on cpulist0
                                      
                                      bmeeksB 1 Reply Last reply Reply Quote 0
                                      • bmeeksB
                                        bmeeks @Burner27
                                        last edited by bmeeks

                                        @Burner27 said in SG3100 limitations:

                                        Jul 10 13:35:02 ProfessorX kernel: mvneta1: promiscuous mode enabled
                                        Jul 10 13:40:28 ProfessorX check_reload_status: Syncing firewall
                                        Jul 10 13:40:54 ProfessorX check_reload_status: Syncing firewall
                                        Jul 10 13:48:31 ProfessorX php-fpm[61390]: /index.php: User logged out for user 'admin' from: 192.168.1.145 (Local Database)
                                        Jul 10 14:00:00 ProfessorX php: [pfBlockerNG] Starting cron process.
                                        Jul 10 14:00:28 ProfessorX php: [pfBlockerNG] No changes to Firewall rules, skipping Filter Reload
                                        Jul 10 14:29:29 ProfessorX syslogd: kernel boot file is /boot/kernel/kernel

                                        So looking at the log snippet posted, there was a period of about 55 minutes between the completion of Snort loading and starting up and the firewall reboot. The last Snort-related line is this one:

                                        Jul 10 13:35:02 ProfessorX kernel: mvneta1: promiscuous mode enabled
                                        

                                        That line is logged by the kernel when libpcap (called by Snort's DAQ subsystem) places the interface in promiscuous mode for packet capturing. 25 minutes after the Snort start, pfBlockerNG's cron task ran (at 14:00). Here is that line:

                                        Jul 10 14:00:00 ProfessorX php: [pfBlockerNG] Starting cron process.
                                        

                                        The reboot seems to have occurred here, almost 30 minutes later at 14:29:29:

                                        Jul 10 14:29:29 ProfessorX syslogd: kernel boot file is /boot/kernel/kernel
                                        

                                        So I'm not 100% convinced Snort is the problem. Not saying it can't be because there have been issues in the past with ARM hardware, but those issues have always surfaced within 10 minutes or less of run time (usually within 3 to 5 minutes); and have always resulted not in a reboot, but rather a crash of the Snort process with a Signal 10 memory bus error logged.

                                        1 Reply Last reply Reply Quote 0
                                        • B
                                          Burner27
                                          last edited by

                                          I couldnt paste the entire txt file due to a character limitation here, but the reboot did occur within 10 minutes after I installed SNORT. Is there a way i can get the complete log file to you for analysis?

                                          bmeeksB 1 Reply Last reply Reply Quote 0
                                          • bmeeksB
                                            bmeeks @Burner27
                                            last edited by bmeeks

                                            @Burner27 said in SG3100 limitations:

                                            I couldnt paste the entire txt file due to a character limitation here, but the reboot did occur within 10 minutes after I installed SNORT. Is there a way i can get the complete log file to you for analysis?

                                            You can highlight and copy-paste the section showing the reboot here. What you posted appeared to be in chronological order sorted with the most recent events last. I happen to set my system to log the other way with the most recent events displayed first. But it really does not matter.

                                            From the log snippet you posted, I'm not immediately seeing anything missing between the 13:35 last Snort entry and the 14:29 firewall reboot. Tell me what is missing in that section of time, and then copy-paste just those lines here.

                                            You are also free to export the entire system log to a text file and upload that file there (even zipping it if required to reduce the size). However, that really isn't necessary if you just isolate and post the section covering the time interval between when Snort finished starting up and when you say the first reboot happened.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.