==== Suricata on Opnsense as Transparent Bridge (3 interfaces) ==== == Initial Setup == * Install base install, assign interfaces, DHCP or static IP with gateway on WAN, no IP on LAN and set static IP on OPT1, run updates from console * Disable the firewall by logging into shell and running pfctl -d Note: for some reason I had to keep turning it off to keep the connection open, release current as of 06/18/2021. * Log into the WebUI on the OPT1 interface and skip the Wizard. * Go to Firewall → OPT1 and create a rule to allow all in → save and apply changes * Enable the firewall by logging into shell and running pfctl -e * Disconnect from OPT1 and reconnect to make sure your firewall rule stuck * Delete any rules from WAN/LAN interfaces then add allow all. == Bridge WAN/LAN == [[https://docs.opnsense.org/manual/how-tos/transparent_bridge.html|https://docs.opnsense.org/manual/how-tos/transparent_bridge.html]] * Disable outbound NAT, go to Firewall → NAT → Outbound and select “Disable Outbound NAT rule generation”. * Set net.link.bridge.pfil_bridge from default to 1 in System → Settings → System Tuneables. * Disable filtering on member interfaces by changing net.link.bridge.pfil_member from default to 0 in System → Settings → System Tuneables. * Create a bridge of LAN and WAN, go to Interfaces → Other Types → Bridge. Add Select LAN and WAN. * Go to Interfaces → Assign → Available network port, select the bridge from the list and hit +. * Add an IP address to the interface that you would like to use to manage the bridge. Go to Interfaces → [OPT1], enable the interface and fill-in the ip/netmask. (use OPT2 if you have a 3rd NIC and have already used this for OPT1) * Go to Interfaces → [WAN] and unselect Block private networks and Block bogon networks. * Disable the DHCP server on LAN go to Services → DHCPv4 → [LAN] and unselect enable. * Go to Firewall → Rules and add a rule per interface to allow all traffic of any type. * Go to Firewall → Settings → Advanced → enable "Disable administration anti-lockout rule" * Remove the IP subnets in use for LAN and WAN by changing the interface type to none. Go to Interfaces → [LAN] and Interfaces → [WAN] to do so. * If you have a dedicated NIC to manage the firewall and have added OPT2 to the bridge interface for Internet access/updates/etc Go to Fireall → OPT2 and create a rule to block OPT2 in to "this firewall", make sure this rule is at the top of the rule list. * Or if you have a dedicated NIC to manage the firewall, disable OPT2 and add a gateway for OPT1 so that the firewall device can communicate with the Internet. == IDS/IPS == * Enable the system by going to Services → Intrusion Detection → Administration → check Enabled (don't enable IPS yet, IDS yes but IPS no) * Select the rules you want by going to Download then checking the rules you want then enabling them, follow-up by checking them again and downloading the rules. * After the download is complete go to the Rules tab and enable/disable the included rules (note: not all rules are enabled by default and there are about 92000 rules as of 06-17-2021). * Goto Schedule tab and enable a schedule for downloading rules updates, every 6 to 24 hours should be fine.