1
20.7 Legacy Series / Re: 20.7.4 Success!! PPPoE?
« on: October 28, 2020, 08:13:16 am »....
I was wondering what that state of play is with PPPoE in the WAN interface.
...
Yes, I would love to know as well
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
....
I was wondering what that state of play is with PPPoE in the WAN interface.
...
I'm on the same subnet, I made this rules just because the HTTPS requests has to be redirceted to the port 4443 of my hostYes, that's the issue. If you are on the same subnet your packets to the server are never traversing the firewall as no routing is needed. You can either solve this by moving your server to another subnet or your clients and let the firewall route between those (as it's doing for the wan side as well)
Thanks @mbTested with igb interfaces and pppoe on wan (removed VLAN for testing)
Suricata seems to start fine:
..
..
However, it doesn't alert or block on anything.
Then I tried Sensei on the WAN Interface. It starts, but afterwards Internet is gone.
Reports do not show any sessions or blocks.
Hi @Quetschwalze, thanks. Any chances that you can also send a pcap trace? - Sensei is not meant for WAN right now.
2020-08-23T09:02:28 suricata[76340] [100106] <Notice> -- all 2 packet processing threads, 4 management threads initialized, engine started.
2020-08-23T09:02:28 suricata[76340] [100805] <Notice> -- opened netmap:pppoe1/T from pppoe1: 0x172871fd300
2020-08-23T09:02:28 suricata[76340] [100805] <Notice> -- opened netmap:pppoe1^ from pppoe1^: 0x172871fd000
2020-08-23T09:02:28 suricata[76340] [100798] <Notice> -- opened netmap:pppoe1^ from pppoe1^: 0x17236be4300
2020-08-23T09:02:28 suricata[76340] [100798] <Notice> -- opened netmap:pppoe1/R from pppoe1: 0x17236be4000
Thanks for looking into this @mb
I have put the 20.7 proxmox virtual instance of OPNsense inline with PPPoE by backing up my 20.1 config and restoring to 20.7. Really easy to do and was up and running quickly.
Suricata runs successfully and alerts on the LAN interface (Virtio)
Switched to run on the WAN interface and am not receiving alerts. The new log view with v5 Suricata is different and seems to cycle with this when trying to establish IPS on the PPPoE WAN
Counter | TM Name | Value
------------------------------------------------------------------------------------
Date: 6/14/2020 -- 08:49:09 (uptime: 0d, 00h 08m 17s)
------------------------------------------------------------------------------------
flow.memuse | Total | 7154304
tcp.reassembly_memuse | Total | 196608
tcp.memuse | Total | 1146880
flow_mgr.rows_skipped | Total | 65536
flow_mgr.rows_checked | Total | 65536
flow.spare | Total | 10000
------------------------------------------------------------------------------------
Counter | TM Name | Value
------------------------------------------------------------------------------------
Date: 6/14/2020 -- 08:49:01 (uptime: 0d, 00h 08m 09s)
------------------------------------------------------------------------------------
flow.memuse | Total | 7154304
tcp.reassembly_memuse | Total | 196608
tcp.memuse | Total | 1146880
flow_mgr.rows_skipped | Total | 65536
flow_mgr.rows_checked | Total | 65536
flow.spare | Total | 10000
------------------------------------------------------------------------------------
I am getting the ifconfig -a to you via PM
Here is the log when it successfully runs on the LAN interface
flow.memuse | Total | 7177096
tcp.reassembly_memuse | Total | 231424
tcp.memuse | Total | 1146880
flow_mgr.rows_maxlen | Total | 1
flow_mgr.rows_skipped | Total | 65534
flow_mgr.rows_checked | Total | 65536
flow_mgr.flows_notimeout | Total | 2
flow_mgr.flows_checked | Total | 2
flow.spare | Total | 10000
flow_mgr.new_pruned | Total | 9
app_layer.flow.failed_udp | Total | 40
app_layer.tx.dns_udp | Total | 20
app_layer.flow.dns_udp | Total | 6
app_layer.flow.failed_tcp | Total | 4
app_layer.tx.dhcp | Total | 2
app_layer.flow.dhcp | Total | 1
app_layer.flow.tls | Total | 3
tcp.overlap | Total | 1
tcp.rst | Total | 16
tcp.synack | Total | 9
tcp.syn | Total | 9
tcp.sessions | Total | 9
flow.udp | Total | 47
flow.tcp | Total | 39
decoder.max_pkt_size | Total | 1514
decoder.avg_pkt_size | Total | 474
decoder.udp | Total | 320
decoder.tcp | Total | 988
decoder.ethernet | Total | 1594
decoder.ipv6 | Total | 2
decoder.ipv4 | Total | 1306
decoder.bytes | Total | 756423
decoder.pkts | Total | 1594
capture.kernel_packets | Total | 1594
------------------------------------------------------------------------------------
Counter | TM Name | Value
------------------------------------------------------------------------------------
Date: 6/14/2020 -- 09:10:57 (uptime: 0d, 00h 01m 52s)
-----------------------------------------------------------------------------------
German is only at 75% translated although it has the most translators assigned. All non-translated strings are displayed in English. What you are seeing is the result of the situation.How could one help with the translation?
Cheers,
Franco
Take a look at Fitlet2 with J3455: https://fit-iot.com/web/products/fitlet2/I can recommend that as well, great devices!
Ok, makes sense.Pretty sure that's the cause. You probably need to whitelist that URL. Verify that sensei is the cause via Reports-Blocked-Live blocked sessions
So I got Sensei to work, but then I found my wifi access point (Unifi AP-HD) stopped working right after.
And after some troubleshooting I saw that it could not reach the controller anymore (running on server in same LAN). Since Sensei was the only and most recent change in my network I disabled it and within seconds the UAP-HD came online again an I was able to adopt it again in the controller.
So it seems Sensei is blocking my Unifi AP to reach the controller (http://ip-of-controller:8080/inform) somehow. I'm using the hostname.domain of my controller, perhaps it's something to do with DNS being blocked or so?