Is there any way to push the pfsense/snort data to Security Onion?
Thanks
Hi
Check out this blog post about getting your pfsense firewall logs into ELSA maybe that could be interesting for you.
http://www.securitygrit.com/2013/03/pfsense-into-elsa.html
/Lysemose
Now I know why the pfsense logs in ELSA were impossible to understand.
I have tried this with the root user and get the "Content-Type:text/plain" response but no file is being generated (/root folder)? I read that the SED command should have -l? Have you been successful with these changes?
Here is my php script
<?php
$filter=file_get_contents ('/etc/inc/filter.inc');
$filternew =
str_replace(
"-ttt -i pflog0 | logger -t pf -p local0.info",
"-ttt -i pflog0 | /usr/bin/sed -e 'N;s/\\\\n //;P;D;' | logger -t pf -p local0.info",$filter);
if (strcmp($filter, $filternew) !=0) {
file_put_contents('filter.inc.new',$filternew);
file_put_contents('filter.inc.org',$filter);
}
?>
I wanted to thank you for such a great product. Provides great insite into whats happening on my network.
If I remove Snort from the firewall and let Security Onion pick up all the trafic, I still need to filter out the intrusions. Snort on pfsense is blocking alot of portsweeps, RBN, CINS, DROPS, DShield, innbound SQL alerts etc.
Only issue is that I see the alert and a block but cant get a pcap in pfsense for further review.
If there are articles to help design the IDS/IPS environment, i want to be a sponge. Thanks for your help.
Thanks in advance,
GP
From pfSense add "System Patches" from the "Avalable Packages" repository.
In the System:Patches menu, select "+" and add a new patch
If you're on 2.1, add this patch:
http://files.pfsense.org/jimp/patches/pf-log-oneline-option.diff
If you're on 2.0.x, use this patch instead:
http://files.pfsense.org/jimp/patches/pf-log-oneline-option-2.0.x.diff
Once you have entered the patch details, you need to "Fetch" and than "Apply"
(HELP LINK) https://doc.pfsense.org/index.php/System_Patches
Finally. check the box on the system log settings to force the firewall logs to one line.
I am getting all of the syslog entries from pfSense into ELSA but am having difficulties with the following entries.
This is a "Block" entry from the "Firewall" log. ELSA is treating it as a single entry and cant pivot on the src/dst IP or other data. I am also trying to get the actual Rule name that triggered the alert to be shown. Currently its labeling the entry as "5/0(match) instead of the Actual Rule Name.
01-05-2014 20:08:26 Local0.Info 10.1.41.3 Jan 5 20:08:27 pf: 00:00:00.570566 rule 5/0(match): block in on rl0: (tos 0x0, ttl 114, id 37724, offset 0, flags [none], proto TCP (6), length 48) 185.25.184.184.28796 > xxx.xxx.xxx.xxx.5900: Flags, cksum 0x8635 (correct), seq 979907292, win 65535, options [mss 1460,nop,nop,sackOK], length 0
Any help would be appreciated.
(See attachment for parser)
I have added the ruleset to the end of patterndb.xml between <patterndb> </patterndb> and ran "service syslog-ng restart"
The syslogs are going into the existing database ELSA class/fields "FIREWALL_ACCESS_LOG" and "FIREWALL_CONNECTION_END". Select "Grid Display".
Tested with several pfSense boxes and all seems to work fine.
I have tried pfsense as firewall n snort. works like a charm! :)) its v stable. just enabled barnyard2 and viewing logs from Snorby! looks nice.
u need to allow connection to the snorby box (mysql port) from the pfsense ip!