Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Detecting specific anomalous traffic

    Scheduled Pinned Locked Moved Off-Topic & Non-Support Discussion
    3 Posts 2 Posters 457 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      syntactic.net
      last edited by

      There's lots of anomalous traffic that will just get dropped at the firewall, and rightly so. Firewall logs are painfully boring as it is. However, I'd like for some anomalous conditions to generate an alert, and I'm not sure how to achieve that with pfsense.

      For example, if an internal host sends out a SYN, and the firewall relays that and receives two valid SYN/ACK responses - not one, not a flood, but exactly two - that tells me somebody is monitoring traffic on an upstream router and is using that to try to get at my network. I'd really like to know about that. It should be easy to detect.

      Default behavior at the firewall is to just drop the second SYN/ACK packet and I'm never going to see anything in the logs.

      Any ideas?

      1 Reply Last reply Reply Quote 0
      • bmeeksB
        bmeeks
        last edited by bmeeks

        You could investigate the stream-events rules in Suricata. It's possible some of those might detect that. When you install one of the IDS/IPS packages (Suricata or Snort) on pfSense, the package sniffs traffic between the physical NIC and the firewall rules engine. So the IDS would see all inbound WAN traffic if run on the WAN interface before anything within the pfSense firewall engine or even the kernel networking stack touched that traffic.

        There is nothing native within pfSense that "alerts" on anything. It is a firewall that passes, blocks or rejects traffic. It logs what it does, but it does not generate "alerts" in the classical sense. You would need to send the pertinent logs to an offline SIEM of some sort for further analysis and alerting from the SIEM tool. This holds true for the IDS/IPS packages as well. While they both have GUI displays where you can examine alerts, they don't send emails or otherwise externally alert the admin. Again, that would be something a third-party SIEM tool would do by examining exported logs from pfSense.

        1 Reply Last reply Reply Quote 1
        • S
          syntactic.net
          last edited by

          Thanks! Yes, Suricata's stream-events seem to have what I'm looking for, if I configure it correctly.

          1 Reply Last reply Reply Quote 0
          • First post
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.