The easiest test, that always works when properly setup is the eicar test over http.Code: [Select]curl http://pkg.opnsense.org/test/eicar.com.txt
curl http://pkg.opnsense.org/test/eicar.com.txt
A small question??Wouldnt it be nice to see alerts in WAN since its IPS as well??Who is trying to enter your house and with what?I mean its better to be safe than sorry and a lot easier to keept them out than trying to get rid of them when they are allready inside and passing traffic on LAN??I know the ports are blocked anyways, but LAN doesnt tell me what they are trying to accomplish before it happens...
Quote from: Supermule on April 01, 2020, 12:58:33 pmA small question??Wouldnt it be nice to see alerts in WAN since its IPS as well??Who is trying to enter your house and with what?I mean its better to be safe than sorry and a lot easier to keept them out than trying to get rid of them when they are allready inside and passing traffic on LAN??I know the ports are blocked anyways, but LAN doesnt tell me what they are trying to accomplish before it happens...I see alerts from the WAN side of things. I also run Sensei so I have to use the WAN interface and, for ports that I have forwarded, I'm seeing alerts.
Here runing Suricata on opnsense on WAN and all LAN interfaces. No alerts on WAN, however, as seen frequently (tons of tbh) with Snort on WAN...
you're welcome, reading our docs again, we probably should state more firmly why you shouldn't use a wan type interface if you're depending on nat.
Quote from: chemlud on March 30, 2020, 04:10:53 pmHere runing Suricata on opnsense on WAN and all LAN interfaces. No alerts on WAN, however, as seen frequently (tons of tbh) with Snort on WAN...So you are running snart and suricata?