Owner: Emmanuel Technology Consulting
Former Sophos SG(Astaro) advocate/researcher/Silver Partner
PfSense w/Suricata, ntopng,
Other addons to follow
Owner: Emmanuel Technology Consulting
Former Sophos SG(Astaro) advocate/researcher/Silver Partner
PfSense w/Suricata, ntopng,
Other addons to follow
Owner: Emmanuel Technology Consulting
Former Sophos SG(Astaro) advocate/researcher/Silver Partner
PfSense w/Suricata, ntopng,
Other addons to follow
Owner: Emmanuel Technology Consulting
Former Sophos SG(Astaro) advocate/researcher/Silver Partner
PfSense w/Suricata, ntopng,
Other addons to follow
137/138 is the internal network and needs to stay internal.
Rule 1 is:
Some servers may go everyway.
Rule 2:
drop internal 137
Rule 3:
drop internal 138
Rule 4:
Blacklist (consist of ipnumbers who may never enter)
Rule 5:
mail server to smtp mailserver group.
one mail server conects to 3 other mailservers outside
Rule 6:
Internal to a private site
Rule 7:
SSL VPN to terminal server
Rule 8:
SSL VPN to internal DNS server
Rule 9:
SSL VPN based on user (we self) may go everywhere internal
Rule 10:
Internal dns server to outside dns servergroup consist of four external dns servers.
Also we see 255.255.255.255 Which can't we can drop except the dault rule (default drop)does. We have 35 rules so that means the firewall hold the against 35 rules...
I want do drop that traffic sooner. By not logging does not mean the packetfilter isn't processing the traffic i hope. And we have beamers on the network that need to stay inside but is generating 3.255:5001 Traffic.
Also i can't stop that. If more beamers are on the firewall is still processing it.
Even if the beamers don't have the firewall as gateway??????
We have 2 internet lines
1 internal line
1 administrative interface where in the future we do all the changes.
ps. disk space for log no problem plenty off it
cpu see clipboard10
Owner: Emmanuel Technology Consulting
Former Sophos SG(Astaro) advocate/researcher/Silver Partner
PfSense w/Suricata, ntopng,
Other addons to follow
Thanks for your response william. I have done what you have suggested...
I see know also other drops.... Lower count value. But traffic is still high about 12GB a day. Also contact framework filter restarts some times.... is there a way for the astaro to drop by ip adress...... because the printer traffic etc can be left alone...
Owner: Emmanuel Technology Consulting
Former Sophos SG(Astaro) advocate/researcher/Silver Partner
PfSense w/Suricata, ntopng,
Other addons to follow
Hi,
reject sends a message to the source where as drop just ignores the packet. Then the source has no idea whether the packet reached an end point.
Ian M
Hi,
no drop is better, the site looks like it is dead. Reject provides a positive response to a hacker.
Ian M