• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

suricata show Alert on wrong interface

Scheduled Pinned Locked Moved IDS/IPS
6 Posts 2 Posters 820 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • K
    kiokoman LAYER 8
    last edited by kiokoman Oct 2, 2020, 11:36 AM Oct 2, 2020, 11:23 AM

    pfsense is 2.5.0 latest snapshotImmagine.jpg
    why do i see alert for the wrong ip/interface?
    172.17.0.0/24 is on another interface, SRV
    192.168.10.0/24 is LAN

    [2.5.0-DEVELOPMENT][root@pfSense.kiokoman.home]/root: netstat -rn
    Routing tables
    
    Internet:
    Destination        Gateway            Flags     Netif Expire
    default            213.xxx.xxx.xxx     UGS      pppoe0
    10.0.8.1           link#13            UHS         lo0
    10.0.8.2           link#13            UH       ovpns1
    127.0.0.1          link#4             UH          lo0
    172.16.0.0/24      10.0.8.2           UGS      ovpns1
    172.17.0.0/24      link#8             U      vmx1.100
    172.17.0.254       link#8             UHS         lo0
    192.168.1.0/24     10.0.8.2           UGS      ovpns1
    192.168.2.0/24     link#7             U       vmx1.30
    192.168.2.254      link#7             UHS         lo0
    192.168.10.0/24    link#2             U          vmx1
    192.168.10.254     link#2             UHS         lo0
    192.168.50.0/24    link#9             U       vmx1.50
    192.168.50.254     link#9             UHS         lo0
    213.xxx.xxx.xxx     link#11            UH       pppoe0
    216.66.80.98       213.xxx.xxx.xxx     UGHS     pppoe0
    217.xxx.xxx.xxx     link#11            UHS         lo0
    

    ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
    Please do not use chat/PM to ask for help
    we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
    Don't forget to Upvote with the 👍 button for any post you find to be helpful.

    1 Reply Last reply Reply Quote 0
    • B
      bmeeks
      last edited by Oct 2, 2020, 12:57 PM

      Is LAN the parent interface for those VLANs I see in the second screenshot? If so, that's why the alerts (IPs) are showing on LAN.

      1 Reply Last reply Reply Quote 0
      • K
        kiokoman LAYER 8
        last edited by Oct 2, 2020, 1:01 PM

        @kiokoman said in suricata show Alert on wrong interface:

        172.17.0.0/24 link#8 U vmx1.100

        yes it is, .. probably i never noticed if it's normal

        ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
        Please do not use chat/PM to ask for help
        we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
        Don't forget to Upvote with the 👍 button for any post you find to be helpful.

        1 Reply Last reply Reply Quote 0
        • B
          bmeeks
          last edited by Oct 2, 2020, 1:02 PM

          Yeah, when running on the parent interface of VLANs, the PCAP logic with promiscuous mode will show everything travelling on the physical wire. That's why, when using VLANs, it is most efficient in terms of memory and CPU usage to put the IDS on the parent interface and not run multiple instances on each VLAN.

          1 Reply Last reply Reply Quote 0
          • K
            kiokoman LAYER 8
            last edited by kiokoman Oct 3, 2020, 6:07 PM Oct 3, 2020, 3:10 PM

            @bmeeks

            about:

            Interface PCAP Snaplen
            This value may need to be increased if the physical interface is passing VLAN traffic and expected alerts are not being received.

            what is a good value to put in here ? 1522 = 1500 + ethernet + vlan ?

            you said it is most efficient..to put the IDS on the parent interface

            is it considered wrong to have instances on each VLAN ? for example for the vlan where i have some servers running i set IPS Policy Selection to security while on the other vlans i set it as Balanced,
            is it better to run only one istance and set the policy to security on the parent interface ?

            ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
            Please do not use chat/PM to ask for help
            we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
            Don't forget to Upvote with the 👍 button for any post you find to be helpful.

            B 1 Reply Last reply Oct 5, 2020, 12:46 AM Reply Quote 0
            • B
              bmeeks @kiokoman
              last edited by bmeeks Oct 5, 2020, 1:19 PM Oct 5, 2020, 12:46 AM

              @kiokoman said in suricata show Alert on wrong interface:

              @bmeeks

              about:

              Interface PCAP Snaplen
              This value may need to be increased if the physical interface is passing VLAN traffic and expected alerts are not being received.

              what is a good value to put in here ? 1522 = 1500 + ethernet + vlan ?

              The snaplen parameter needs to be long enough to hold the standard Ethernet frame plus any VLAN overhead. There is still debate, it appears, on the web about what to use. A quick Google search will find several links. So sorry to say I can't give you a good answer. I put the field in the package to allow users to experiment if they felt the need. The default value is still what has always been with each IDS package. The field was added to allow those who wanted to experiment to do so.

              you said it is most efficient..to put the IDS on the parent interface

              is it considered wrong to have instances on each VLAN ? for example for the vlan where i have some servers running i set IPS Policy Selection to security while on the other vlans i set it as Balanced,
              is it better to run only one istance and set the policy to security on the parent interface ?

              Nothing is generally considered "wrong" with an IDS configuration. It simply comes down to RAM and CPU utilization balanced against the security needs. If it is vital that two VLANs have different security policies applied, then running an IDS instance on each with different configured rules is what it takes. However, if you find both instances have, for all intents and purposes, the same rules, why waste RAM and CPU time with an IDS instance on each VLAN? Just run a single IDS instance on the parent and see everything in the configured VLANs.

              1 Reply Last reply Reply Quote 1
              6 out of 6
              • First post
                6/6
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                This community forum collects and processes your personal information.
                consent.not_received