==== Suricata on Opnsense as Transparent Bridge (3 interfaces) ====
== Initial Setup ==
* Install base install, assign interfaces, DHCP or static IP with gateway on WAN, no IP on LAN and set static IP on OPT1, run updates from console
* Disable the firewall by logging into shell and running
pfctl -d
Note: for some reason I had to keep turning it off to keep the connection open, release current as of 06/18/2021.
* Log into the WebUI on the OPT1 interface and skip the Wizard.
* Go to Firewall → OPT1 and create a rule to allow all in → save and apply changes
* Enable the firewall by logging into shell and running
pfctl -e
* Disconnect from OPT1 and reconnect to make sure your firewall rule stuck
* Delete any rules from WAN/LAN interfaces then add allow all.
== Bridge WAN/LAN ==
[[https://docs.opnsense.org/manual/how-tos/transparent_bridge.html|https://docs.opnsense.org/manual/how-tos/transparent_bridge.html]]
* Disable outbound NAT, go to Firewall → NAT → Outbound and select “Disable Outbound NAT rule generation”.
* Set net.link.bridge.pfil_bridge from default to 1 in System → Settings → System Tuneables.
* Disable filtering on member interfaces by changing net.link.bridge.pfil_member from default to 0 in System → Settings → System Tuneables.
* Create a bridge of LAN and WAN, go to Interfaces → Other Types → Bridge. Add Select LAN and WAN.
* Go to Interfaces → Assign → Available network port, select the bridge from the list and hit +.
* Add an IP address to the interface that you would like to use to manage the bridge. Go to Interfaces → [OPT1], enable the interface and fill-in the ip/netmask. (use OPT2 if you have a 3rd NIC and have already used this for OPT1)
* Go to Interfaces → [WAN] and unselect Block private networks and Block bogon networks.
* Disable the DHCP server on LAN go to Services → DHCPv4 → [LAN] and unselect enable.
* Go to Firewall → Rules and add a rule per interface to allow all traffic of any type.
* Go to Firewall → Settings → Advanced → enable "Disable administration anti-lockout rule"
* Remove the IP subnets in use for LAN and WAN by changing the interface type to none. Go to Interfaces → [LAN] and Interfaces → [WAN] to do so.
* If you have a dedicated NIC to manage the firewall and have added OPT2 to the bridge interface for Internet access/updates/etc Go to Fireall → OPT2 and create a rule to block OPT2 in to "this firewall", make sure this rule is at the top of the rule list.
* Or if you have a dedicated NIC to manage the firewall, disable OPT2 and add a gateway for OPT1 so that the firewall device can communicate with the Internet.
== IDS/IPS ==
* Enable the system by going to Services → Intrusion Detection → Administration → check Enabled (don't enable IPS yet, IDS yes but IPS no)
* Select the rules you want by going to Download then checking the rules you want then enabling them, follow-up by checking them again and downloading the rules.
* After the download is complete go to the Rules tab and enable/disable the included rules (note: not all rules are enabled by default and there are about 92000 rules as of 06-17-2021).
* Goto Schedule tab and enable a schedule for downloading rules updates, every 6 to 24 hours should be fine.