Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort vs Suricata Lists

    Scheduled Pinned Locked Moved IDS/IPS
    5 Posts 2 Posters 561 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DefenderLLCD
      DefenderLLC
      last edited by DefenderLLC

      So are the suppression list formats the same if I go from Snort back to Suricata? I would assume so since the rulesets are the same (minus OpenAppID). I spent a lot of time fine tuning those and I'd hate to start over. Obviously I would need to remove any of the L7 stuff. Thanks.

      Dobby_D 1 Reply Last reply Reply Quote 0
      • DefenderLLCD
        DefenderLLC
        last edited by

        440a89cc-d806-48e9-a639-573016561d3a-image.jpeg

        1 Reply Last reply Reply Quote 0
        • DefenderLLCD
          DefenderLLC
          last edited by

          Thank you, ChatGPT Plus. :)

          1 Reply Last reply Reply Quote 0
          • Dobby_D
            Dobby_ @DefenderLLC
            last edited by

            @DefenderLLC said in Snort vs Suricata Lists:

            So are the suppression list formats the same if I go from Snort back to Suricata? I would assume so since the rulesets are the same (minus OpenAppID). I spent a lot of time fine tuning those and I'd hate to start over. Obviously I would need to remove any of the L7 stuff. Thanks.

            If it comes at one day that snort is not
            anymore available for pfSense, you
            could also go another way. Set up
            a RaspBerry PI 4B 4GB/8GB as a sensor
            and another unit as a snort server, done.

            You may be able to set up more sensors, let us
            say on each LAN switch one and then they should be connected to the server to feed him.

            You may be able enrich that scenario to something else like you want, such;

            • IPS in front of your Servers in the DMZ and/or LAN
            • IDS at the switches
            • OSSec on any other PC/WS/Server

            Or snort for the DMZ and snort for the LAN
            and OSSec on any PC, Workstation and the
            servers. You may be able to do it in pfSense
            and outsite like you want to go with it.

            #~. @Dobby

            Turris Omnia - 4 Ports - 2 GB RAM / TurrisOS 7 Release (Btrfs)
            PC Engines APU4D4 - 4 Ports - 4 GB RAM / pfSense CE 2.7.2 Release (ZFS)
            PC Engines APU6B4 - 4 Ports - 4 GB RAM / pfSense+ (Plus) 24.03_1 Release (ZFS)

            DefenderLLCD 1 Reply Last reply Reply Quote 1
            • DefenderLLCD
              DefenderLLC @Dobby_
              last edited by

              @Dobby_ Good idea. I do have two 8GB RP4B's just sitting around doing nothing. I was using those for Pi-hole before switching to pfBlockerNG.

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.