• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

how to block persistent and repeated http inboud connection

Scheduled Pinned Locked Moved Firewalling
7 Posts 5 Posters 525 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • A
    alexferro32
    last edited by Mar 3, 2023, 6:11 PM

    Hi!

    I'm searching how to block source IP by number http inbound connections per second with pfSense+pfBlockerNG or Suricata. Is there any wayto do this?

    Thanks, Alessandro

    M B 2 Replies Last reply Mar 3, 2023, 6:17 PM Reply Quote 0
    • M
      mcury @alexferro32
      last edited by Mar 3, 2023, 6:17 PM

      @alexferro32 I suppose that what you want is this?

      2444e7a0-3c40-44ea-b5dd-1f8e7088775b-image.png

      If so, check advanced option in your inbound firewall rule.

      dead on arrival, nowhere to be found.

      1 Reply Last reply Reply Quote 0
      • B
        bmeeks @alexferro32
        last edited by Mar 3, 2023, 6:36 PM

        @alexferro32 said in how to block persistent and repeated http inboud connection:

        Hi!

        I'm searching how to block source IP by number http inbound connections per second with pfSense+pfBlockerNG or Suricata. Is there any wayto do this?

        Thanks, Alessandro

        You can do this with either Snort or Suricata by using the rule alert threshold feature. This is an advanced feature not directly provided in the GUI, and it would require you either write your own custom rule, or copy an existing similar rule and then modify it accordingly. Once you have your custom rule created, you can add it by going to the RULES tab for the Snort interface, selecting Custom Rules in the drop-down, and then typing or pasting your new rule into the text box and saving it.

        Here is the Snort documentation on the rule threshold parameter: http://manual-snort-org.s3-website-us-east-1.amazonaws.com/node35.html.

        And here is the same documentation for Suricata: https://suricata.readthedocs.io/en/suricata-6.0.0/configuration/global-thresholds.html.

        J M 2 Replies Last reply Mar 3, 2023, 6:53 PM Reply Quote 1
        • J
          johnpoz LAYER 8 Global Moderator @bmeeks
          last edited by Mar 3, 2023, 6:53 PM

          @bmeeks While sure could do this with IPS, wouldn't you just be able to do it via the advanced options that @mcury mentioned.

          I have not had to play with such a rule.. But I would think in the advanced section you could limit rate of connections just in the firewall rule?

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          B 1 Reply Last reply Mar 3, 2023, 6:57 PM Reply Quote 0
          • B
            bmeeks @johnpoz
            last edited by Mar 3, 2023, 6:57 PM

            @johnpoz said in how to block persistent and repeated http inboud connection:

            @bmeeks While sure could do this with IPS, wouldn't you just be able to do it via the advanced options that @mcury mentioned.

            I have not had to play with such a rule.. But I would think in the advanced section you could limit rate of connections just in the firewall rule?

            I have never played with that either. I suppose, from looking over the available parameters, it could work.

            To tell the truth I was specifically only paying attention to the OP's question about the two IDS/IPS packages, so I answered from that angle. I did not mean to imply @mcury's method would not work.

            J 1 Reply Last reply Mar 3, 2023, 7:55 PM Reply Quote 0
            • J
              johnpoz LAYER 8 Global Moderator @bmeeks
              last edited by johnpoz Mar 3, 2023, 7:56 PM Mar 3, 2023, 7:55 PM

              @bmeeks no I didn't think you were ;)

              And yeah everyone normally looks at a problem from their angle what they are most familiar with.. I was just kind of hoping maybe you had played with them before.. But guess not...

              Should be something to play with, never had need before to test the rate limiting - but pretty sure their are some fun tools to generate traffic as different rates to see if the advanced options work ;) heheh

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

              1 Reply Last reply Reply Quote 0
              • M
                michmoor LAYER 8 Rebel Alliance @bmeeks
                last edited by Mar 3, 2023, 8:12 PM

                @bmeeks ive done something similar. Make sure you acquire a baseline first so you can set your threshold accordingly.

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                1 Reply Last reply Reply Quote 0
                5 out of 7
                • First post
                  5/7
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                  This community forum collects and processes your personal information.
                  consent.not_received