Community discussions

MikroTik App
 
kravemir
Frequent Visitor
Frequent Visitor
Topic Author
Posts: 98
Joined: Sun Aug 13, 2023 10:55 am
Location: Slovakia
Contact:

IDS/IPS - SOHO - pfSense, OPNsense, or other with/without RouterOS?

Sat Aug 24, 2024 10:16 am

RouterOS's firewall can shield networks (VLANs) from outer threats, but the most hacks are executed from within the network by a malicious actor (compromised device with software/firmware backdoor phoning C&C,...).

I'm thinking of adding pfSense, OPNsense, Suricata, snort or other IDS/IPS to the stack. I have literally zero experience with those. I'm wondering, which one to pick.

Some of those can also act as router, and also do inter-VLAN routing, and act as IPS - blocking suspicious traffic between VLANs. Does it make sense to run a router with RouterOS then, if such firewall can basically replace it? Did anyone replace edge/main RouterOS router with routing IDS/IPS firewall?

In case of not replacing RouterOS, does RouterOS support (easy) integration with any IPS?

And, what's yours overall experience IDS/IPS for SOHO? What's the most easy to setup, and reliable?
 
User avatar
anav
Forum Guru
Forum Guru
Posts: 23213
Joined: Sun Feb 18, 2018 11:28 pm
Location: Nova Scotia, Canada
Contact:

Re: IDS/IPS - SOHO - pfSense, OPNsense, or other with/without RouterOS?

Sat Aug 24, 2024 8:26 pm

Didnt think any existed that were any good. I am aware of high end routers $$$, and then you need to pay subscriptions $$$.
 
User avatar
Joni
Member Candidate
Member Candidate
Posts: 160
Joined: Fri Mar 20, 2015 2:46 pm
Contact:

Re: IDS/IPS - SOHO - pfSense, OPNsense, or other with/without RouterOS?

Sun Aug 25, 2024 10:45 am

Image

There is no inside nor outside.
There is no safe side and other side.
Either you allow traffic or you don't.
There are no safe or dangerous IPs and ports, anything can communicate to any address and port
Once malicious software is on the inside it effectively instantly becomes the outside.

https://en.wikipedia.org/wiki/Zero_trust_security_model

https://github.com/funkolab/cs-mikrotik-bouncer including bouncing yourself, because that especially in relation to Mikrotik, inside is more often the danger.
 
killersoft
Member Candidate
Member Candidate
Posts: 273
Joined: Mon Apr 11, 2011 2:34 pm
Location: Victoria, Australia

Re: IDS/IPS - SOHO - pfSense, OPNsense, or other with/without RouterOS?

Mon Aug 26, 2024 1:24 am

I am going down this path at the moment.
I have a front end wan mikrotik rb5009, connected to a netgate pfsense hardware appliance for internet services for desk pc's which are also in an active directory environment.
That said at this point will be either going down a proxy gateway approach or traparent bridge with either suracatra or snort. Cert's will get pushed via AD.
Ideally unusual traffic patterns will get picked and blocked.
The front end mikrotik will of course do its finest with firewalling.
 
kravemir
Frequent Visitor
Frequent Visitor
Topic Author
Posts: 98
Joined: Sun Aug 13, 2023 10:55 am
Location: Slovakia
Contact:

Re: IDS/IPS - SOHO - pfSense, OPNsense, or other with/without RouterOS?

Tue Aug 27, 2024 9:02 am

@killersoft do you mean, that you have pfsense in between ISP and RB5009, or between RB5009 and LAN (switch, devices,...)?

And, what does it have to do with certs, and active directory? Isn't IDS/IPS transparent network MITM, that detects/kills suspicious connections?