curl http://malware.wicar.org/data/eicar.com > /dev/null
It turned out that the most important setting change to avoid total loss of network connectivity was:In Interfaces > Settings set VLAN Hardware Filtering to Disable VLAN Hardware Filtering
Quote from: Oliver on July 25, 2019, 09:46:12 pmIt turned out that the most important setting change to avoid total loss of network connectivity was:In Interfaces > Settings set VLAN Hardware Filtering to Disable VLAN Hardware FilteringThis is the helptext in OPNsense for IPS Mode: Enable protection mode (block traffic).Before enabling, please disable all hardware offloading first in advanced network.
Hardware CRC Disable hardware checksum offloadHardware TSO Disable hardware TCP segmentation offloadHardware LRO Disable hardware large receive offload
VLAN Hardware Filtering
Enable Hardware CRC checksum offload [ ]Enable Hardware TSO (TCP segmentation offload) [ ]Enable Hardware LRO (large receive offload) [ ]Enable Hardware VLAN Filtering [ ]
Thanks for pointing to this, but I'd like to respectfully disagree:---Any opinions on that?
After some experimentation I was able to successfully run Suricata in IPS mode with local VLANs on OPNsense 19.7.Hardware tested:ZOTAC ZBOX PRO CI329 nano: Intel Celeron N4100, 2 x Realtek PCIe GBE (re), 8 GB RAMThomas Krenn LES v3: Intel Celeron N3160, 2 x Intel i211AT (igb), 4 GB RAMTopology:WAN: pppoe on igb1/re1LAN on igb0/re0 (not used directly)VLANS with LAN as parent (all internal hosts connect to one of the VLANs)The primary problem I have experienced was the total loss of network connectivity (on all interfaces) when switching from IDS to IPS mode. Several workarounds posted elsewhere did not solve the problem but rather introduced new ones (cf. this posting).It turned out that the most important setting change to avoid total loss of network connectivity was:In Interfaces > Settings set VLAN Hardware Filtering to Disable VLAN Hardware FilteringOther configuration details:Services > Intrusion Detection > Administration - Settings (in advanced mode):Enabled: (checked)IPS mode: (checked)Promiscuous mode: (checked)Pattern matcher: HyperscanInterfaces: LANHome networks: 192.168.0.0/16 10.0.0.0/8 172.16.0.0/12Log package payload: (checked)(Other settings left at their defaults.)I have downloaded and enabled all rules offered by OPNsense with actions set to Drop, except for ET emerging-policy (downloaded and enabled, but action unchanged). Some individual rules were then disabled as deemed necessary.In the above setting, Suricata did block VLAN traffic and reported "SID 7999999: OPNsense test eicar virus" on the "Alert" tab when running this test on an internal Linux host (on a VLAN):Code: [Select]curl http://malware.wicar.org/data/eicar.com > /dev/nullSo far everything seems to run pretty stable with a scheduled reboot every 24 hours.