Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    SNORT Alerts and Interfaces

    Scheduled Pinned Locked Moved IDS/IPS
    13 Posts 3 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bmeeksB
      bmeeks
      last edited by bmeeks

      Your rule is detecting with traffic flowing either way. So the 192.168.20.0/24 network can be source or destination and the rule will fire. Same for the 192.168.10.0/24 network.

      Snort sits outside of the firewall rules, so depending on which interface or interfaces you have Snort running on, it will be seeing this traffic before the firewall rules logic. This is a common misconception among users. Snort sits between the NIC and the firewall rules. It does not sit "behind" the firewall rules. So firewall rules have no bearing on what Snort on a given interface sees. Snort also puts an interface into promiscuous mode.

      You did not give any details about which interface or interfaces have Snort configured on them. Do you have a Snort instance on both your LAN and Guest networks, or just the LAN or just the Guest? Is the Guest network a VLAN?

      1 Reply Last reply Reply Quote 0
      • P
        powerextreme
        last edited by

        @bmeeks
        Hello breeks, I have SNORT running on the LAN and the GUEST network interfaces. The GUEST network is a VLAN.

        So if I understand you, SNORT will see a packet addressed to the LAN device from the GUEST device before a rule (blocking) gets applied to the packet?

        My objective is to use SNORT to detect if that packet actually made it through to the LAN. I want to detect if any GUEST devices are communicating with LAN devices.

        bmeeksB 1 Reply Last reply Reply Quote 0
        • NogBadTheBadN
          NogBadTheBad
          last edited by NogBadTheBad

          @powerextreme said in SNORT Alerts and Interfaces:

          lert on any inter-Lan Traffic 192.168.10.0/24 is LAN 192.168.20.0/24 is GUEST
          alert tcp 192.168.10.0/24 any <> 192.168.20.0/24 any (msg:"Unauthorized interLAN traffic"; sid:1000001; rev:1;)
          I also have a firewall rule blocking traffic from the Guest network to the LAN network.

          You should block traffic from your GUEST network to your local LANs with a firewall rule, something like this:-

          Screenshot 2020-09-23 at 14.18.33.png

          n_ip_local is an alias containing my local subnets.

          Andy

          1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

          P 1 Reply Last reply Reply Quote 0
          • bmeeksB
            bmeeks @powerextreme
            last edited by bmeeks

            @powerextreme said in SNORT Alerts and Interfaces:

            @bmeeks
            Hello breeks, I have SNORT running on the LAN and the GUEST network interfaces. The GUEST network is a VLAN.

            So if I understand you, SNORT will see a packet addressed to the LAN device from the GUEST device before a rule (blocking) gets applied to the packet?

            My objective is to use SNORT to detect if that packet actually made it through to the LAN. I want to detect if any GUEST devices are communicating with LAN devices.

            In your case, the firewall rule action will happen AFTER the packets have passed by Snort. Snort is sitting between your physical NIC and the rest of pfSense. So one way of looking at inbound traffic on the LAN is like this --

            NIC --> Snort --> Firewall Rules

            To be more technically precise, Snort uses libpcap and works with copies of the packets when running in Legacy Blocking Mode. So packets actually go from the NIC straight to the firewall rules, but a copy of every packet is also sent to Snort (from the NIC and before the firewall rules). So my original statement is true: Snort sees packets before firewall rules are applied when the traffic is inbound on an interface. For outbound traffic from an interface, the firewall rules have already been applied before the packet gets to Snort and the NIC.

            So outbound traffic on an interface looks like this --

            Firewall Rules --> Snort --> NIC

            1 Reply Last reply Reply Quote 0
            • P
              powerextreme
              last edited by

              @bmeeks

              I think I understand. But how does that explain the alerts? The alerts happened on the LAN interface. It shows the the source as coming from the GUEST networking to an address in the LAN network.

              Screen Shot 2020-09-23 at 9.34.18 AM.png

              bmeeksB 1 Reply Last reply Reply Quote 0
              • bmeeksB
                bmeeks @powerextreme
                last edited by

                @powerextreme said in SNORT Alerts and Interfaces:

                @bmeeks

                I think I understand. But how does that explain the alerts? The alerts happened on the LAN interface. It shows the the source as coming from the GUEST networking to an address in the LAN network.

                Screen Shot 2020-09-23 at 9.34.18 AM.png

                You said the Guest network was a VLAN. I am assuming it is a VLAN defined on the LAN (meaning the LAN interface is the parent interface). Because Snort puts the interface(s) it is configured on in promiscuous mode, it will see all traffic on the physical NIC (so LAN and any VLANs where LAN is the parent).

                P 1 Reply Last reply Reply Quote 0
                • P
                  powerextreme @NogBadTheBad
                  last edited by

                  @NogBadTheBad
                  I have a similar rule earlier in the thread. How does your's effectively differ?

                  NogBadTheBadN 1 Reply Last reply Reply Quote 0
                  • P
                    powerextreme @bmeeks
                    last edited by

                    @bmeeks
                    Oh, that makes sense. So the traffic is seen but that doesn't mean that it actually made it into the LAN network?

                    Since I am running VLAN's on the LAN interface, do I even need to run it on the GUEST VLAN?

                    bmeeksB 1 Reply Last reply Reply Quote 0
                    • bmeeksB
                      bmeeks @powerextreme
                      last edited by bmeeks

                      @powerextreme said in SNORT Alerts and Interfaces:

                      @bmeeks
                      Oh, that makes sense. So the traffic is seen but that doesn't mean that it actually made it into the LAN network?

                      Yes, that is correct.

                      Since I am running VLAN's on the LAN interface, do I even need to run it on the GUEST VLAN?

                      Probably not, since the LAN instance will see everything on that physical NIC anyway. And any instance of Snort you can not run frees up RAM and CPU for other things.

                      1 Reply Last reply Reply Quote 0
                      • P
                        powerextreme
                        last edited by

                        So given this configuration, is there a recommended way for me to get alerts on a packet that actually made it through from the GUEST LAN(VLAN) to the LAN?

                        It seems like the one's I am getting are false alarms.

                        bmeeksB 1 Reply Last reply Reply Quote 0
                        • bmeeksB
                          bmeeks @powerextreme
                          last edited by

                          @powerextreme said in SNORT Alerts and Interfaces:

                          So given this configuration, is there a recommended way for me to get alerts on a packet that actually made it through from the GUEST LAN(VLAN) to the LAN?

                          It seems like the one's I am getting are false alarms.

                          No, the only way would be to truly put the Guest and LAN networks on separate physical NICs.

                          1 Reply Last reply Reply Quote 0
                          • NogBadTheBadN
                            NogBadTheBad @powerextreme
                            last edited by NogBadTheBad

                            @powerextreme said in SNORT Alerts and Interfaces:

                            @NogBadTheBad
                            I have a similar rule earlier in the thread. How does your's effectively differ?

                            You didn't post the whole picture with the pass sections.

                            Why just not log the blocks to a syslog server, I send my logs to the syslog server on my NAS.

                            Check out TCP port 7000:-

                            https://www.speedguide.net/port.php?port=7000

                            Andy

                            1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.