Hi,we have many Web Server with e-commerce (Magento, Prestashop, etc...) and some Windows Servers that must be reachable via RDP on non standar Port (Port forward vs 3389) and we want to test OPNsense to use it as our new firewall. The Web Servers have to be reachable via FTP and SSH from well known IPs (for ssh we will use non standar port). Of course the most important feature for us is Suricata as IPS/IDS. Naturally we will use ET Pro Telemetry, now the questions are:which are the rules to enable to protect our Servers? And what about false positive?Is it enough to enable Suricata only on the WAN Interface?We will use OPNsense as VM under Proxmox (KVM), could you give me some advice on how to optimize the OPNSense configuration?Does Sensei help me?Thank you to all
Quote from: mic on January 12, 2021, 12:44:31 pmHi,we have many Web Server with e-commerce (Magento, Prestashop, etc...) and some Windows Servers that must be reachable via RDP on non standar Port (Port forward vs 3389) and we want to test OPNsense to use it as our new firewall. The Web Servers have to be reachable via FTP and SSH from well known IPs (for ssh we will use non standar port). Of course the most important feature for us is Suricata as IPS/IDS. Naturally we will use ET Pro Telemetry, now the questions are:which are the rules to enable to protect our Servers? And what about false positive?Is it enough to enable Suricata only on the WAN Interface?We will use OPNsense as VM under Proxmox (KVM), could you give me some advice on how to optimize the OPNSense configuration?Does Sensei help me?Thank you to allA web server should only expose web service (better with a reverse proxy to protect it), really bad idea to allow ssh. And FTP, really?If you need SSH access you should evaulate to use a jump server reachable with VPN