Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    New Snort 4.0 + = dumb

    Scheduled Pinned Locked Moved IDS/IPS
    12 Posts 7 Posters 1.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • NogBadTheBadN
      NogBadTheBad
      last edited by

      This post is deleted!
      1 Reply Last reply Reply Quote 0
      • I
        Impatient
        last edited by

        Blocked Tab is for legacy blocking not inline blocking.

        1 Reply Last reply Reply Quote 2
        • bmeeksB
          bmeeks
          last edited by bmeeks

          "Blocked" really has no meaning with inline IPS mode. Drop is the key action for inline IPS mode. Block implies a host IP is not permittted to send/receive any traffic regardless of protocol or port number. That is not true for inline IPS mode. A given individual packet is "dropped" in that mode when a rule triggers, but other packets for the same host can pass unhindered assuming they do not trigger a rule. Thus inline IPS mode allows much more granular control of security by selectively dropping packets instead of simply blocking all traffic.

          So when you use Inline IPS Mode, you need to look on the ALERTS tab and note the action under the ACTION column. Alerts that result in drops are also supposed to render in red text, but perhaps that's not working properly (I will take a look at the PHP code and see about that). The BLOCKS tab is worthless for all inline IPS interfaces. It is still relevant for any Legacy Blocking Mode interfaces, though, so that's why it's still present. Some folks have split setups with some interfaces using inline mode while others use Legacy Blocking mode.

          Your question and statements indicate perhaps you are inexperienced with managing an IPS. Take a look at the Sticky Posts in the top of this sub-forum and read through some of them. They do a good job of explaining the differences between Inline IPS Mode and Legacy Blocking Mode. There are also some great reads about using the SID MGMT tab features to control your rules without "clicking each alert".

          1 Reply Last reply Reply Quote 0
          • Cool_CoronaC
            Cool_Corona
            last edited by

            Just a quick recap

            I use Suricata. Running mixed interfaces.

            145e3c6b-5eff-43c0-b2d1-600d80fc3f8f-billede.png

            the funny thing is.... when running mixed mode, alerts from the Inline IPS shows up in blocked tab as well.

            7268ed29-3817-4bf8-a64d-edf3ee5e6e07-billede.png

            aadf2bba-2ba2-4478-ab91-f9e489e47532-billede.png

            And it actually figures in the dashboard widget as well

            8b6d5b8e-7a8f-409d-9dbe-1a5d58682e97-billede.png

            A note: I dont mind showing of my external IP. Its a home lab so nothing to get there if people decide to try 🦌

            bmeeksB 1 Reply Last reply Reply Quote 0
            • bmeeksB
              bmeeks @Cool_Corona
              last edited by

              @Cool_Corona said in New Snort 4.0 + = dumb:

              Just a quick recap

              I use Suricata. Running mixed interfaces.

              145e3c6b-5eff-43c0-b2d1-600d80fc3f8f-billede.png

              the funny thing is.... when running mixed mode, alerts from the Inline IPS shows up in blocked tab as well.

              7268ed29-3817-4bf8-a64d-edf3ee5e6e07-billede.png

              aadf2bba-2ba2-4478-ab91-f9e489e47532-billede.png

              And it actually figures in the dashboard widget as well

              8b6d5b8e-7a8f-409d-9dbe-1a5d58682e97-billede.png

              A note: I dont mind showing of my external IP. Its a home lab so nothing to get there if people decide to try 🦌

              The OP's questions were about Snort, not Suricata. There are some differences in how the binary portions of those two package log things.

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator
                last edited by johnpoz

                Just out of pure curiosity - do you have 1433 open to the public net? Really? If not what is the point of the IPS, since that would just get dropped with any other traffic not sent to a port you have forwarded.

                So some off topic advice - having 1433 open to the public net, not a good idea ;)

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 0
                • kiokomanK
                  kiokoman LAYER 8
                  last edited by

                  you should.. stop.. asking embarrassing questions 🤔 😒
                  😂

                  ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
                  Please do not use chat/PM to ask for help
                  we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
                  Don't forget to Upvote with the 👍 button for any post you find to be helpful.

                  1 Reply Last reply Reply Quote 0
                  • Cool_CoronaC
                    Cool_Corona
                    last edited by

                    No I dont but I like to know who is knocking and where/when/what they are looking for.

                    Thats why. And you dont have to agree. :)

                    1 Reply Last reply Reply Quote 0
                    • kiokomanK
                      kiokoman LAYER 8
                      last edited by

                      but you don't need suricata/snort to see it,
                      that traffic would bounce off the firewall
                      you just need the firewall log

                      ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
                      Please do not use chat/PM to ask for help
                      we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
                      Don't forget to Upvote with the 👍 button for any post you find to be helpful.

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        ^ Exactly firewall log all of that by default..

                        Here is the last 2000 entries 180 of them have been hits to 1433.

                        1433.png

                        I concur that it can be interesting see what noise is out there, but there is little need of running IPS for that.. But there is a lot of noise. I turned off the default log because there is too much, I don't need or want to see out of state traffic.. I really only want to see stuff that sent a syn. And for udp its just way to much.. So I only log the interesting udp ports via another rule.

                        udp.png

                        Your free to run what you want - but calling what you want to run, for really no other reason that your interested in what noise is hitting your wan, and then calling it dumb? That seems a bit odd to me is all.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • bmeeksB
                          bmeeks @wolfsden3
                          last edited by bmeeks

                          @wolfsden3 said in New Snort 4.0 + = dumb:

                          I'm finding the new snort 4.0 + to be dumb and MUCH HARDER than the older version.

                          It seems like this new version of Snort is trying to solve problems that didn't exist and it's making all new problems. Maybe it's just me, dunno.

                          Any insight would be helpful.

                          If you choose not to enable Inline IPS Mode, then there is absolutely no difference in how Snort 4.x operates compared to Snort 3.2.x -- none at all.

                          If you choose to use the new Inline IPS Mode (and you have a netmap-supported NIC), then you do have to learn a few new things as the underlying technology behind Inline IPS Mode is fundamentally different.

                          If you do not like the new mode, then simply do not enable it and everything will be exactly the same as it was with the older package versions.

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.