• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Problem to detect internal portscan to firewall LAN IP

Scheduled Pinned Locked Moved IDS/IPS
3 Posts 2 Posters 485 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • H
    HappyTommi
    last edited by HappyTommi Sep 24, 2022, 10:22 AM Sep 24, 2022, 9:43 AM

    Hi!

    Snort runs well but I have a (small) problem.

    On my lan side there are some dangerous people (I can not remove them).

    I did a p2p-block and this is working as long as I am using the Home Net:default or I include the LAN-Network in a manual pass-list. But with included LAN-network I can not see a portscan to the firewall IP. If I remove the LAN /24 from the passlist I can see the port-scan but the p2p-block will not work anymore ...

    Any idears?

    1 Reply Last reply Reply Quote 0
    • B
      bmeeks
      last edited by bmeeks Sep 24, 2022, 1:43 PM Sep 24, 2022, 1:41 PM

      If the misbehaving machines are on your LAN, then there is only a limited amount of mitigation you can do at the firewall. But I would not be overly concerned about an internal port scan. Snort's port scan preprocessor is a bit finicky anyway, and is prone to false triggering.

      In your setup, the local LAN hosts are not getting blocked but any p2p destination IP they communicate with gets blocked. That's about the best you can hope for with Legacy Mode.

      If your NIC is supported for Inline IPS Mode, you can switch to that providing you are not using VLANs. That mode does not use nor require a pass list as it drops individual packet flows instead of blocking the host's IP address. So much less of a large hammer combatting the problem 🙂.

      If you switch to Inline IPS Mode, consult the two Sticky Posts at the top of this sub-forum for information. You will need to manually change rule actions to DROP for those rules which you wish to block traffic. Otherwise they will only generate alerts and not block anything.

      Here is the first Sticky: https://forum.netgate.com/topic/143812/snort-package-4-0-inline-ips-mode-introduction-and-configuration-instructions.

      And here is the second: https://forum.netgate.com/topic/128480/how-automatic-sid-management-and-user-rule-overrides-work-in-snort-and-suricata.

      H 1 Reply Last reply Sep 24, 2022, 2:52 PM Reply Quote 0
      • H
        HappyTommi @bmeeks
        last edited by Sep 24, 2022, 2:52 PM

        Thank you. Have a nice weekend😁

        1 Reply Last reply Reply Quote 0
        1 out of 3
        • First post
          1/3
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
          This community forum collects and processes your personal information.
          consent.not_received