OPNsense
  • Home
  • Help
  • Search
  • Login
  • Register

  • OPNsense Forum »
  • English Forums »
  • Intrusion Detection and Prevention »
  • Using Rulesets in Suricata IPS
« previous next »
  • Print
Pages: 1 [2]

Author Topic: Using Rulesets in Suricata IPS  (Read 92659 times)

networkguy

  • Newbie
  • *
  • Posts: 12
  • Karma: 0
    • View Profile
Re: Using Rulesets in Suricata IPS
« Reply #15 on: February 11, 2018, 01:59:16 am »
Thanks. I was trying to think of a scenario where you may want the rule to be active as alert for that particular host but still deny as a whole. Thinking about it more I guess if a rule comes up on legitimate traffic that may just be configured poorly you probably would want to allow that traffic for other destinations anyways but just know about it.

Last question I have. I hope :) When I change from IDS to IPS do I have to go to every individual rule and change them from alert to deny or is there a way to do this globally?
Logged

elektroinside

  • Hero Member
  • *****
  • Posts: 574
  • Karma: 51
    • View Profile
Re: Using Rulesets in Suricata IPS
« Reply #16 on: February 11, 2018, 08:54:50 am »
You could try creating custom rules targeting individual hosts, however some rule orders need to be set for it to work, and i don't think that's possible... anyway, dcol has a very nice tutorial here about custom rules: https://forum.opnsense.org/index.php?topic=7209.0

To drop entire rulesets, go to Services: Intrusion Detection: Administration: Download tab, edit each ruleset (click on the pencil) and set it to 'Change all alerts to drop action' next to the 'Input filter'. Then 'Rules' tab and click 'Apply'.

More info here about this: https://forum.opnsense.org/index.php?topic=6893.0
« Last Edit: February 11, 2018, 08:59:23 am by elektroinside »
Logged
OPNsense v18 | HW: Gigabyte Z370N-WIFI, i3-8100, 8GB RAM, 60GB SSD, | Controllers: 82575GB-quad, 82574, I221, I219-V | PPPoE: RDS Romania | Down: 980Mbit/s | Up: 500Mbit/s

Team Rebellion Member

jodumont

  • Newbie
  • *
  • Posts: 8
  • Karma: 0
    • View Profile
Re: Using Rulesets in Suricata IPS
« Reply #17 on: September 27, 2018, 03:42:24 pm »
an interesting source of information is compiled by firehol
http://iplists.firehol.org/

you could compare different list and also see which one overlaps..
Logged

Julien

  • Hero Member
  • *****
  • Posts: 666
  • Karma: 33
    • View Profile
Re: Using Rulesets in Suricata IPS
« Reply #18 on: November 17, 2018, 01:49:31 am »
Thank you guys for the explaination.
We are using Opnsense in front of our production where we have some servers running including exchange server.
we have enabled those rules ( emerging-netbios.rules/emerging-web_client.rules )as advies in the first post using hyperscan and IPS Mode on however the speed drops -60%

is this a IPS issue or IDS/IPS issue ?
Thank you
Logged
OPNsense 23.1.7_3-amd64
FreeBSD 13.1-RELEASE-p7
OpenSSL 1.1.1t 7 Feb 2023

jschellevis

  • Administrator
  • Full Member
  • *****
  • Posts: 156
  • Karma: 37
    • View Profile
Re: Using Rulesets in Suricata IPS
« Reply #19 on: November 17, 2018, 02:10:58 am »
To determine the cause of the performance drop (probably a large ruleset containing patterns) I would suggest disabling all that contain patterns and then re-enable one by one.

Also ssl fingerprint rules are very consuming, this will likely be fixed with  Suricata 4.1 in the upcoming OPNsense 19.1 release.

So experimenting with enabling/disabling rulesets may be the best way to figure this out.

In general you need a performant multi core CPU for high throughput when a lot of pattern matching and/or ssl fingerprint rules are enabled.
Logged

Julien

  • Hero Member
  • *****
  • Posts: 666
  • Karma: 33
    • View Profile
Re: Using Rulesets in Suricata IPS
« Reply #20 on: November 17, 2018, 02:18:36 am »
Quote from: jschellevis on November 17, 2018, 02:10:58 am
To determine the cause of the performance drop (probably a large ruleset containing patterns) I would suggest disabling all that contain patterns and then re-enable one by one.

Also ssl fingerprint rules are very consuming, this will likely be fixed with  Suricata 4.1 in the upcoming OPNsense 19.1 release.

So experimenting with enabling/disabling rulesets may be the best way to figure this out.

In general you need a performant multi core CPU for high throughput when a lot of pattern matching and/or ssl fingerprint rules are enabled.
When i disable the IPS and keeps those rules enabled the speed drops to 100%. i beleive the issue is IPS and not rules.
i have just 3 rules enabled now and speed is 500/500 without IPS, when IPS is on speed drops to 180/180 and sometimes 200/200.
Do we really need the IPS in the productions ?
CPU we are using is Intel(R) Core(TM) i5-3317U CPU @ 1.70GHz (4 cores) and 8GB memory.

Thank you
Logged
OPNsense 23.1.7_3-amd64
FreeBSD 13.1-RELEASE-p7
OpenSSL 1.1.1t 7 Feb 2023

peter008

  • Newbie
  • *
  • Posts: 31
  • Karma: 3
    • View Profile
Re: Using Rulesets in Suricata IPS
« Reply #21 on: December 18, 2018, 01:59:20 pm »
Same here.

With IPS disabled we get our full 200/50 speed, with IPS enabled (no matter how many rules activated) speed drops to about 80/30 MBit.

Any news on this?
Logged

xmichielx

  • Newbie
  • *
  • Posts: 44
  • Karma: 0
    • View Profile
Re: Using Rulesets in Suricata IPS
« Reply #22 on: January 24, 2019, 06:11:28 pm »
I have the same bandwidth and use a PCengines APU2C4, the rulesets that you choose, the scan engine (Hyperscan preferably) and the networks that you have enabled in the HOME_NETWORK/LAN entry do have impact on the IPS performance and how much bandwidth is dropped.
Logged

PSimoes

  • Newbie
  • *
  • Posts: 1
  • Karma: 0
    • View Profile
Re: Using Rulesets in Suricata IPS
« Reply #23 on: March 11, 2019, 12:16:34 pm »
I already have the rules on my computer but i don't no where to put them.... anyone knows?
Logged

theennesh

  • Newbie
  • *
  • Posts: 1
  • Karma: 0
    • View Profile
Re: Using Rulesets in Suricata IPS
« Reply #24 on: June 24, 2024, 08:38:20 pm »
I followed all the instructions in the article https://medium.com/@parkerbenitez/opnsense-next-gen-firewall-a-deep-dive-into-suricata-integration-e5b71cb9b3b3 completely. However, in the download section, after selecting "enable selected" and then clicking on "Download & Update Rules," the rule file appeared empty, and I'm unsure why. Can anyone please help me with this issue?
Logged

mimugmail

  • Hero Member
  • *****
  • Posts: 6767
  • Karma: 494
    • View Profile
Re: Using Rulesets in Suricata IPS
« Reply #25 on: June 25, 2024, 05:55:24 am »
Can you post a screenshot of download section?
Logged
WWW: www.routerperformance.net
Support plans: https://www.max-it.de/en/it-services/opnsense/
Commercial Plugins (German): https://opnsense.max-it.de/

  • Print
Pages: 1 [2]
« previous next »
  • OPNsense Forum »
  • English Forums »
  • Intrusion Detection and Prevention »
  • Using Rulesets in Suricata IPS
 

OPNsense is an OSS project © Deciso B.V. 2015 - 2024 All rights reserved
  • SMF 2.0.19 | SMF © 2021, Simple Machines
    Privacy Policy
    | XHTML | RSS | WAP2