Open Mauro2k opened 5 years ago
You may need to adjust the HOME and EXTERNAL net variables in that case.
How exactly do you conduct your tests ?
-- Regards, Peter Manev
On 1 Feb 2019, at 21:21, Mauro2k notifications@github.com wrote:
Perform a clean installation of selks v5RC1 and later v4 on a physical server. the problem is that it does not register malicious events as alerts. For example
I see p2p traffic, mined coins, malware in EventBox (Events) but it does not catalog them as alerts!
What can I have wrongly configured?
It is as if he were not analyzing the installed rules.
Can someone help me please?
— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub, or mute the thread.
Thanks for answering.
All my internal segments are within the 192.168.x.x range:
192.168.5.x 192.168.9.x 192.168.25.x etc
vars:
address-groups: HOME_NET: "[192.168.0.0/24]"
#HOME_NET: "[10.0.0.0/8]"
#HOME_NET: "[172.16.0.0/12]"
#HOME_NET: "any"
EXTERNAL_NET: "!$HOME_NET"
#EXTERNAL_NET: "any"
My tests are done by:
Bittorrent downloads Bitcoin mining Mining of altcoins Access to blacklist sites Port scan
I have another Suricata version 4 - Scirius CE v2.0.1. which if you see the alerts.
I do not understand what the configuration error is in my new IDS.
Scirius CE v2.0.1.
HOME_NET: "[192.168.0.0/16]" should be better than HOME_NET: "[192.168.0.0/24]" according to your internal range
Perform a clean installation of selks v5RC1 and later v4 on a physical server. the problem is that it does not register malicious events as alerts. For example
I see p2p traffic, mined coins, malware in EventBox (Events) but it does not catalog them as alerts!
What can I have wrongly configured?
It is as if he were not analyzing the installed rules.
Can someone help me please?