Hi Mike,
Replies inline.
On Tue, May 19, 2015 at 2:03 PM, Mike <
michael...@gmail.com> wrote:
> Currently I have a pfSense firewall working as a router, firewall, and IDS (Snort), sitting between the modem and my LAN. I'd like to add SO into the network to work as an IDS.
Good choice!
> I know that I can hook SO into pfSense to receive Snort alerts using Snorby and send logs to ELSA. However, it is my understanding that that approach will only show logs and not actually record data, which means that I can't really do forensics using all the other SO tools.
Correct.
> My question is: How would I implement SO so that it can work as in IDS? I was thinking about getting a switch and spanning/mirroring the LAN onto that port and hooking that port into a NIC on my SO machine (and the second NIC into the LAN so that I can manage it). So that my setup will look like this:
>
> [INTERNET]<===>[MODEM]<===>[PFSENSE]<===>[LAN]
> ||
> =>[SO]
If I understand your diagram correctly, Security Onion would be seeing
traffic on the external side of your firewall, so all traffic would
look like it was coming from and/or going to your public IP address.
Instead, I'd recommend monitoring on the inside of the firewall to see
the real internal IP addresses.
> If I do that, wouldn't my IPS catch (hopefully) all the alerts/attacks before they ever make it into the LAN, which will make attacks harder to investigate? Or am I missing something? I really do not want to turn off my IPS so that it can keep protecting the network (it already saved me a number of times).
Prevention eventually fails. Keep your IPS enabled but use Security
Onion to see what gets through the IPS.
--
Doug Burks
Need Security Onion Training or Commercial Support?
http://securityonionsolutions.com