Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    SNORT Alerts and Interfaces

    Scheduled Pinned Locked Moved IDS/IPS
    13 Posts 3 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      powerextreme
      last edited by

      @bmeeks
      Hello breeks, I have SNORT running on the LAN and the GUEST network interfaces. The GUEST network is a VLAN.

      So if I understand you, SNORT will see a packet addressed to the LAN device from the GUEST device before a rule (blocking) gets applied to the packet?

      My objective is to use SNORT to detect if that packet actually made it through to the LAN. I want to detect if any GUEST devices are communicating with LAN devices.

      bmeeksB 1 Reply Last reply Reply Quote 0
      • NogBadTheBadN
        NogBadTheBad
        last edited by NogBadTheBad

        @powerextreme said in SNORT Alerts and Interfaces:

        lert on any inter-Lan Traffic 192.168.10.0/24 is LAN 192.168.20.0/24 is GUEST
        alert tcp 192.168.10.0/24 any <> 192.168.20.0/24 any (msg:"Unauthorized interLAN traffic"; sid:1000001; rev:1;)
        I also have a firewall rule blocking traffic from the Guest network to the LAN network.

        You should block traffic from your GUEST network to your local LANs with a firewall rule, something like this:-

        Screenshot 2020-09-23 at 14.18.33.png

        n_ip_local is an alias containing my local subnets.

        Andy

        1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

        P 1 Reply Last reply Reply Quote 0
        • bmeeksB
          bmeeks @powerextreme
          last edited by bmeeks

          @powerextreme said in SNORT Alerts and Interfaces:

          @bmeeks
          Hello breeks, I have SNORT running on the LAN and the GUEST network interfaces. The GUEST network is a VLAN.

          So if I understand you, SNORT will see a packet addressed to the LAN device from the GUEST device before a rule (blocking) gets applied to the packet?

          My objective is to use SNORT to detect if that packet actually made it through to the LAN. I want to detect if any GUEST devices are communicating with LAN devices.

          In your case, the firewall rule action will happen AFTER the packets have passed by Snort. Snort is sitting between your physical NIC and the rest of pfSense. So one way of looking at inbound traffic on the LAN is like this --

          NIC --> Snort --> Firewall Rules

          To be more technically precise, Snort uses libpcap and works with copies of the packets when running in Legacy Blocking Mode. So packets actually go from the NIC straight to the firewall rules, but a copy of every packet is also sent to Snort (from the NIC and before the firewall rules). So my original statement is true: Snort sees packets before firewall rules are applied when the traffic is inbound on an interface. For outbound traffic from an interface, the firewall rules have already been applied before the packet gets to Snort and the NIC.

          So outbound traffic on an interface looks like this --

          Firewall Rules --> Snort --> NIC

          1 Reply Last reply Reply Quote 0
          • P
            powerextreme
            last edited by

            @bmeeks

            I think I understand. But how does that explain the alerts? The alerts happened on the LAN interface. It shows the the source as coming from the GUEST networking to an address in the LAN network.

            Screen Shot 2020-09-23 at 9.34.18 AM.png

            bmeeksB 1 Reply Last reply Reply Quote 0
            • bmeeksB
              bmeeks @powerextreme
              last edited by

              @powerextreme said in SNORT Alerts and Interfaces:

              @bmeeks

              I think I understand. But how does that explain the alerts? The alerts happened on the LAN interface. It shows the the source as coming from the GUEST networking to an address in the LAN network.

              Screen Shot 2020-09-23 at 9.34.18 AM.png

              You said the Guest network was a VLAN. I am assuming it is a VLAN defined on the LAN (meaning the LAN interface is the parent interface). Because Snort puts the interface(s) it is configured on in promiscuous mode, it will see all traffic on the physical NIC (so LAN and any VLANs where LAN is the parent).

              P 1 Reply Last reply Reply Quote 0
              • P
                powerextreme @NogBadTheBad
                last edited by

                @NogBadTheBad
                I have a similar rule earlier in the thread. How does your's effectively differ?

                NogBadTheBadN 1 Reply Last reply Reply Quote 0
                • P
                  powerextreme @bmeeks
                  last edited by

                  @bmeeks
                  Oh, that makes sense. So the traffic is seen but that doesn't mean that it actually made it into the LAN network?

                  Since I am running VLAN's on the LAN interface, do I even need to run it on the GUEST VLAN?

                  bmeeksB 1 Reply Last reply Reply Quote 0
                  • bmeeksB
                    bmeeks @powerextreme
                    last edited by bmeeks

                    @powerextreme said in SNORT Alerts and Interfaces:

                    @bmeeks
                    Oh, that makes sense. So the traffic is seen but that doesn't mean that it actually made it into the LAN network?

                    Yes, that is correct.

                    Since I am running VLAN's on the LAN interface, do I even need to run it on the GUEST VLAN?

                    Probably not, since the LAN instance will see everything on that physical NIC anyway. And any instance of Snort you can not run frees up RAM and CPU for other things.

                    1 Reply Last reply Reply Quote 0
                    • P
                      powerextreme
                      last edited by

                      So given this configuration, is there a recommended way for me to get alerts on a packet that actually made it through from the GUEST LAN(VLAN) to the LAN?

                      It seems like the one's I am getting are false alarms.

                      bmeeksB 1 Reply Last reply Reply Quote 0
                      • bmeeksB
                        bmeeks @powerextreme
                        last edited by

                        @powerextreme said in SNORT Alerts and Interfaces:

                        So given this configuration, is there a recommended way for me to get alerts on a packet that actually made it through from the GUEST LAN(VLAN) to the LAN?

                        It seems like the one's I am getting are false alarms.

                        No, the only way would be to truly put the Guest and LAN networks on separate physical NICs.

                        1 Reply Last reply Reply Quote 0
                        • NogBadTheBadN
                          NogBadTheBad @powerextreme
                          last edited by NogBadTheBad

                          @powerextreme said in SNORT Alerts and Interfaces:

                          @NogBadTheBad
                          I have a similar rule earlier in the thread. How does your's effectively differ?

                          You didn't post the whole picture with the pass sections.

                          Why just not log the blocks to a syslog server, I send my logs to the syslog server on my NAS.

                          Check out TCP port 7000:-

                          https://www.speedguide.net/port.php?port=7000

                          Andy

                          1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.