pfsense:suricata:rules
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
pfsense:suricata:rules [2021/01/21 10:17] – peter | pfsense:suricata:rules [2021/01/25 14:22] (current) – peter | ||
---|---|---|---|
Line 18: | Line 18: | ||
[[PFSense: | [[PFSense: | ||
- | |||
- | ---- | ||
- | |||
- | ===== Example Rule ===== | ||
- | |||
- | <code snort> | ||
- | alert ip any any -> any any (msg:" | ||
- | |||
- | |||
- | alert icmp any any -> \ | ||
- | any any (msg:" | ||
- | sid:2; rev:1;) | ||
- | |||
- | |||
- | alert tcp any any <> \ | ||
- | any any (pcre:"/ | ||
- | (\s|-)? | ||
- | msg:" | ||
- | detected in clear text"; | ||
- | " | ||
- | |||
- | |||
- | alert tcp 1.2.3.4 1024 - > 5.6.7.8 80 | ||
- | |||
- | |||
- | # Detect SSH protocol anomalies. | ||
- | alert tcp any any -> any 22 (msg:" | ||
- | |||
- | |||
- | # Non-TLS traffic on TLS ports. | ||
- | alert tcp any any -> any [443,465] (msg:" | ||
- | |||
- | |||
- | alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg: | ||
- | |||
- | |||
- | </ | ||
- | |||
- | where: | ||
- | |||
- | * **Action**: | ||
- | * **Header**: | ||
- | * **Options**: | ||
- | |||
- | ---- | ||
- | |||
- | Action: | ||
- | |||
- | * **pass**: | ||
- | * **drop**: | ||
- | * **reject**: | ||
- | * **alert**: | ||
- | |||
- | |||
- | Protocol | ||
- | |||
- | * **ip**: | ||
- | * **tcp**: | ||
- | * **udp**: | ||
- | * **icm** | ||
- | |||
- | <WRAP info> | ||
- | **NOTE:** Suricata also allows you to specify layer 7 protocols as well, such as HTTP (http), SSL and TLS (tls for both), FTP (ftp) and SMB (smb). | ||
- | </ | ||
- | |||
- | |||
- | |||
- | Source and Destination IP and Port | ||
- | |||
- | * An exclamation mark specifies “not”, so “! 10.0.1.0/ | ||
- | * < | ||
- | * You can also mix-and-match with the ! as well. | ||
- | * For example, if you wanted the rule to match IP 192.168.0.5 but not 192.168.1.0/ | ||
- | * You can also throw in variables as well, like so: [$EXTERNAL_NET, | ||
- | |||
- | |||
- | Ports act similarly but they have one additional sign that you can use: | ||
- | |||
- | * < | ||
- | * If you want a non-specific range (i.e.: only a maximum or minimum port number), you can do this: [:1024] (matches everything from 0-1024) or [1024:] (matches from 1024 to the highest [typically 65535]). | ||
- | |||
- | |||
- | Direction Specification | ||
- | |||
- | * Between the IP and ports is the direction of packet flow, in our case ->. There’s two options for this: | ||
- | |||
- | * -> - This is the most common and means only check if the source IP and port are coming in to the destination IP and port. | ||
- | * <> - This will match packet flow in either direction. | ||
- | |||
- | |||
- | Rule Options | ||
- | |||
- | * The 3 most basic options are: | ||
- | |||
- | * **msg**: - What will be prompted in an alert (unless you’re using pass as the action, set this regardless). | ||
- | * **sid**: - This is a unique ID for the rule. | ||
- | * If multiple rules have the same sid Suricata will let you know, and not be nice about it. | ||
- | * Typically you should pick a really high number (> 100000) if you are going to write your own. | ||
- | * **rev**: - Revision number/ID. | ||
- | * Incremented by 1 every time the rule is changed. | ||
- | |||
---- | ---- | ||
Line 127: | Line 26: | ||
https:// | https:// | ||
+ | |||
+ | https:// | ||
https:// | https:// | ||
https:// | https:// | ||
+ | |||
pfsense/suricata/rules.1611224224.txt.gz · Last modified: 2021/01/21 10:17 by peter