Hello,
I would like to create a suppression rule even if pfSense sends many enabled IPSec tunnels.
My actual rules:
<rule id="100030" level="3">
<decoded_as>openvpn-pfsense-ipsec</decoded_as>
<status>^installing</status>
<description>IPSec Tunel $(tunel) enabled on PfSense $(hostname)</description>
</rule>
<rule id="100031" level="3">
<decoded_as>openvpn-pfsense-ipsec</decoded_as>
<status>uninstalling</status>
<description>IPSec Tunel $(tunel) disabled on PfSense $(hostname)</description>
</rule>
<rule id="100032" level="3" timeframe="1">
<if_matched_sid>100030</if_matched_sid>
<same_field>tunel</same_field>
<description>multiplos logs do tunel $(tunel) IPSec habilitado</description>
</rule>
<rule id="100033" level="3" timeframe="1">
<if_matched_sid>100031</if_matched_sid>
<same_field>tunel</same_field>
<description>multiplos logs do tunel $(tunel) IPSec desabilitado</description>
</rule>
<rule id="100034" level="0" frequency="5" timeframe="1">
<if_matched_sid>100030</if_matched_sid>
<same_field>host</same_field>
<description>5 ou mais Túneis IPSec habilitados em 1 segundo no PfSense $(host) — possível restart do serviço IPsec</description>
</rule>
Everything works perfectly, except for rule '100034'.
When rule 100030 is triggered 5 times, rule 100034, which should suppress the alerts, is activated. However, this rule does not maintain suppression for subsequent alerts. Therefore, if 20 IPsec tunnel alerts are dropped, the suppression rule will only be triggered 4 times and rule 100030 will be triggered 16 times.
I would like to suppress the alerts after 5 drops on the same host in 1 second (which likely means an IPsec restart).