Navigation

    Netgate Discussion Forum
    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search

    If i use pfBlockerNG will that take first hit before Suricata?

    pfBlockerNG
    5
    10
    198
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      planetinse last edited by

      If i use pfBlockerNG will that take first hit before Suricata inspects the traffic?

      basically to relief suricata from unnecessary package inspections

      1 Reply Last reply Reply Quote 0
      • Bob.Dig
        Bob.Dig last edited by

        If you are running it on WAN, no.

        1 Reply Last reply Reply Quote 1
        • P
          planetinse last edited by

          Ok, thats kind of unoptimized to inspect things that would be blocked anyway?

          or is the solution to let suricata work on the LAN side only?
          maybe thats a better implementation i have always thought it would be against WAN side...hmm

          T 1 Reply Last reply Reply Quote 0
          • T
            teamits @planetinse last edited by

            Yes, set Suricata to monitor LAN so it 1) doesn't see any traffic blocked by the firewall rules on WAN, and 2) shows you which LAN IP is triggering the alert.

            C 1 Reply Last reply Reply Quote 1
            • C
              Cool_Corona @teamits last edited by

              @teamits said in If i use pfBlockerNG will that take first hit before Suricata?:

              Yes, set Suricata to monitor LAN so it 1) doesn't see any traffic blocked by the firewall rules on WAN, and 2) shows you which LAN IP is triggering the alert.

              Yeah but what if one wants to see who is lurking your WAN and trying to get in??

              Port scanning bastards are not blocked if you dont run it on WAN

              Gertjan T 2 Replies Last reply Reply Quote 0
              • Gertjan
                Gertjan @Cool_Corona last edited by

                @cool_corona said in If i use pfBlockerNG will that take first hit before Suricata?:

                Yeah but what if one wants to see who is lurking your WAN and trying to get in??

                A pure waste of time. Waste of CPU cycles. Waste of energy.
                And all you see are IP address. As packets are dropped based on Ethernet packet header info.
                The data payload, probably encrypted, can't be seen by .... any program. Except if you actually 'accept' (all/any) inbound traffic. Don't, because as soon as you start to do that, it will get known and you're signing your own DDOS death.

                1 Reply Last reply Reply Quote 0
                • T
                  teamits @Cool_Corona last edited by

                  @cool_corona said in If i use pfBlockerNG will that take first hit before Suricata?:

                  Port scanning bastards are not blocked if you dont run it on WAN

                  Well they are blocked by firewall rules. And for NATted servers they are still blocked. The order would be:

                  (internet)->(Suricata on WAN)->(firewall rules on WAN)->(Suricata on LAN)->(server on LAN)

                  Look for posts by the package maintainer recommending to put it on LAN instead of WAN.

                  C 1 Reply Last reply Reply Quote 0
                  • C
                    Cool_Corona @teamits last edited by

                    @teamits said in If i use pfBlockerNG will that take first hit before Suricata?:

                    @cool_corona said in If i use pfBlockerNG will that take first hit before Suricata?:

                    Port scanning bastards are not blocked if you dont run it on WAN

                    Well they are blocked by firewall rules. And for NATted servers they are still blocked. The order would be:

                    (internet)->(Suricata on WAN)->(firewall rules on WAN)->(Suricata on LAN)->(server on LAN)

                    Look for posts by the package maintainer recommending to put it on LAN instead of WAN.

                    I know Steve :)

                    Run it on both WAN and LAN for the same reason.

                    T 1 Reply Last reply Reply Quote 0
                    • T
                      teamits @Cool_Corona last edited by

                      @cool_corona I reread your post and I understand your point. I guess I don't particularly care "who" is port scanning if they can't get in. I just assume "outside is bad." :) (also I missed that you weren't the OP, from the emailed notification)

                      As I understand you, uour usage case is that someone scanning 10000 ports would get blocked before they get to the one open port, vs. if there was only one port open the LAN instance of Suricata wouldn't detect that as a port scan. It would trigger only if they sent a packet that would be forwarded by the one open port and blocked by the LAN instance. In that case the LAN instance is double scanning the packets, so I'm not sure there is as much benefit of scanning there? The LAN alerts might still be more useful for finding the LAN IP of outgoing traffic.

                      Possibly, a way to reduce the double scanning would be to have only rules for port scanning enabled on WAN?

                      C 1 Reply Last reply Reply Quote 0
                      • C
                        Cool_Corona @teamits last edited by

                        @teamits said in If i use pfBlockerNG will that take first hit before Suricata?:

                        @cool_corona I reread your post and I understand your point. I guess I don't particularly care "who" is port scanning if they can't get in. I just assume "outside is bad." :) (also I missed that you weren't the OP, from the emailed notification)

                        As I understand you, uour usage case is that someone scanning 10000 ports would get blocked before they get to the one open port, vs. if there was only one port open the LAN instance of Suricata wouldn't detect that as a port scan. It would trigger only if they sent a packet that would be forwarded by the one open port and blocked by the LAN instance. In that case the LAN instance is double scanning the packets, so I'm not sure there is as much benefit of scanning there? The LAN alerts might still be more useful for finding the LAN IP of outgoing traffic.

                        Possibly, a way to reduce the double scanning would be to have only rules for port scanning enabled on WAN?

                        Exactly the way I am doing it :)

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post

                        Products

                        • Platform Overview
                        • TNSR
                        • pfSense
                        • Appliances

                        Services

                        • Training
                        • Professional Services

                        Support

                        • Subscription Plans
                        • Contact Support
                        • Product Lifecycle
                        • Documentation

                        News

                        • Media Coverage
                        • Press
                        • Events

                        Resources

                        • Blog
                        • FAQ
                        • Find a Partner
                        • Resource Library
                        • Security Information

                        Company

                        • About Us
                        • Careers
                        • Partners
                        • Contact Us
                        • Legal
                        Our Mission

                        We provide leading-edge network security at a fair price - regardless of organizational size or network sophistication. We believe that an open-source security model offers disruptive pricing along with the agility required to quickly address emerging threats.

                        Subscribe to our Newsletter

                        Product information, software announcements, and special offers. See our newsletter archive to sign up for future newsletters and to read past announcements.

                        © 2021 Rubicon Communications, LLC | Privacy Policy