<html><body><div style="color:#000; background-color:#fff; font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:16px"><div id="yui_3_16_0_1_1419399005682_4995" dir="ltr"><span>Thank you so much.</span></div><div id="yui_3_16_0_1_1419399005682_4995" dir="ltr"><span id="yui_3_16_0_1_1419399005682_4996">As I understand, I must use Suricata as a gateway. I have a Local network with 200 clients and my network is not large. I use TMG as a gateway and I want to know can I use Suricata in my local network and not as a Gateway ? Sorry, My question may funny but to be honest, I don't know any more about IPS.</span></div> <div class="qtdSeparateBR"><br><br></div><div class="yahoo_quoted" style="display: block;"> <div style="font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif; font-size: 16px;"> <div style="font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif; font-size: 16px;"> <div dir="ltr"> <font size="2" face="Arial"> On Monday, December 22, 2014 9:16 AM, Leonard Jacobs <ljacobs@netsecuris.com> wrote:<br> </font> </div> <br><br> <div class="y_msg_container"><div id="yiv5651814379"><style><!--
#yiv5651814379
_filtered #yiv5651814379 {font-family:Calibri;panose-1:2 15 5 2 2 2 4 3 2 4;}
_filtered #yiv5651814379 {font-family:Tahoma;panose-1:2 11 6 4 3 5 4 4 2 4;}
#yiv5651814379
#yiv5651814379 p.yiv5651814379MsoNormal, #yiv5651814379 li.yiv5651814379MsoNormal, #yiv5651814379 div.yiv5651814379MsoNormal
{margin:0in;margin-bottom:.0001pt;font-size:12.0pt;font-family:"Times New Roman", "serif";}
#yiv5651814379 a:link, #yiv5651814379 span.yiv5651814379MsoHyperlink
{color:blue;text-decoration:underline;}
#yiv5651814379 a:visited, #yiv5651814379 span.yiv5651814379MsoHyperlinkFollowed
{color:purple;text-decoration:underline;}
#yiv5651814379 p.yiv5651814379MsoAcetate, #yiv5651814379 li.yiv5651814379MsoAcetate, #yiv5651814379 div.yiv5651814379MsoAcetate
{margin:0in;margin-bottom:.0001pt;font-size:8.0pt;font-family:"Tahoma", "sans-serif";}
#yiv5651814379 span.yiv5651814379EmailStyle17
{font-family:"Calibri", "sans-serif";color:#1F497D;}
#yiv5651814379 span.yiv5651814379BalloonTextChar
{font-family:"Tahoma", "sans-serif";}
#yiv5651814379 .yiv5651814379MsoChpDefault
{font-size:10.0pt;}
_filtered #yiv5651814379 {margin:1.0in 1.0in 1.0in 1.0in;}
#yiv5651814379 div.yiv5651814379WordSection1
{}
--></style><div><div class="yiv5651814379WordSection1"><div class="yiv5651814379MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri", "sans-serif";color:#1F497D;">You could also use Suricata setup to run in af-packet mode to perform IPS. I find it more efficient than using Suricata with Iptables for doing dropping of malicious packets. We have been using Af-Packet ips mode for a long time.</span></div><div class="yiv5651814379MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri", "sans-serif";color:#1F497D;"> </span></div><div class="yiv5651814379MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri", "sans-serif";color:#1F497D;"><a rel="nofollow" target="_blank" href="https://home.regit.org/2012/09/new-af_packet-ips-mode-in-suricata/">https://home.regit.org/2012/09/new-af_packet-ips-mode-in-suricata/</a> Don’t forget If you want to drop a packet then the signature needs to be changed from alert to drop.</span></div><div class="yiv5651814379MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri", "sans-serif";color:#1F497D;"> </span></div><div class="yiv5651814379MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri", "sans-serif";color:#1F497D;">https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Packet_Acquisition_API</span></div><div class="yiv5651814379MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri", "sans-serif";color:#1F497D;"> </span></div><div><div style="border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in;"><div class="yiv5651814379MsoNormal"><b><span style="font-size:10.0pt;font-family:"Tahoma", "sans-serif";">From:</span></b><span style="font-size:10.0pt;font-family:"Tahoma", "sans-serif";"> discussion-bounces@lists.openinfosecfoundation.org [mailto:discussion-bounces@lists.openinfosecfoundation.org] <b>On Behalf Of </b>Menerick, John<br><b>Sent:</b> Monday, December 22, 2014 11:07 AM<br><b>To:</b> Jason Long; discussion@lists.openinfosecfoundation.org<br><b>Subject:</b> Re: [Discussion] Ca I use Suricata in a local network?</span></div></div></div><div class="yiv5651814379MsoNormal"> </div><div class="yiv5651814379MsoNormal"><br>Yes, you can. How you do it depends on the scale of your local network, equipment, and other information technology challenges. <a rel="nofollow" target="_blank" href="https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Setting_up_IPSinline_for_Linux">https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Setting_up_IPSinline_for_Linux</a> is one such example. For instance, if you need to scale far beyond a linux router, then you will augment your blocking with remote calls into your network equipment to enact the change.<br><br><br>Warmly,<br><br>John Menerick<br><a rel="nofollow" ymailto="mailto:Security@NetSuite" target="_blank" href="mailto:Security@NetSuite">Security@NetSuite</a><br><a rel="nofollow" target="_blank" href="http://www.securesql.info/">http://www.securesql.info</a><br><br>-----Original Message-----<br>From: <a rel="nofollow" ymailto="mailto:discussion-bounces@lists.openinfosecfoundation.org" target="_blank" href="mailto:discussion-bounces@lists.openinfosecfoundation.org">discussion-bounces@lists.openinfosecfoundation.org</a> [<a rel="nofollow" ymailto="mailto:discussion-bounces@lists.openinfosecfoundation.org" target="_blank" href="mailto:discussion-bounces@lists.openinfosecfoundation.org">mailto:discussion-bounces@lists.openinfosecfoundation.org</a>] On Behalf Of Jason Long<br>Sent: Monday, December 22, 2014 2:44 AM<br>To: <a rel="nofollow" ymailto="mailto:discussion@lists.openinfosecfoundation.org" target="_blank" href="mailto:discussion@lists.openinfosecfoundation.org">discussion@lists.openinfosecfoundation.org</a><br>Subject: [Discussion] Ca I use Suricata in a local network?<br><br>Hello Folks.<br>How are you?<br>Excuse me, I want to know can I use Suricata-IDS in a local network for blocked bad users in my network and prevent them to attack my servers? <br>Excuse me if my question is vague.<br><br>Cheers.<br>_______________________________________________<br>Discussion mailing list<br><a rel="nofollow" ymailto="mailto:Discussion@lists.openinfosecfoundation.org" target="_blank" href="mailto:Discussion@lists.openinfosecfoundation.org">Discussion@lists.openinfosecfoundation.org</a><br><a rel="nofollow" target="_blank" href="https://lists.openinfosecfoundation.org/mailman/listinfo/discussion">https://lists.openinfosecfoundation.org/mailman/listinfo/discussion</a><br><br><br><span style="font-size:7.5pt;">NOTICE: This email and any attachments may contain confidential and proprietary information of NetSuite Inc. and is for the sole use of the intended recipient for the stated purpose. Any improper use or distribution is prohibited. If you are not the intended recipient, please notify the sender; do not review, copy or distribute; and promptly delete or destroy all transmitted information. Please note that all communications and information transmitted through this email system may be monitored and retained by NetSuite or its agents and that all incoming email is automatically scanned by a third party spam and filtering service which may result in deletion of a legitimate e-mail before it is read by the intended recipient.</span> </div></div></div></div><br><br></div> </div> </div> </div> </div></body></html>