-
Version2.4.40 Installation MethodNetwork installation on Red Hat derivative like Oracle, Rocky, Alma, etc. Descriptionconfiguration Installation TypeStandalone Locationon-prem with Internet access Hardware SpecsMeets minimum requirements CPU4 RAM16 Storage for /60 Storage for /nsm250 Network Traffic Collectiontap Network Traffic SpeedsLess than 1Gbps StatusYes, all services on all nodes are running OK Salt StatusYes, there are salt failures (please provide detail below) LogsNo, there are no additional clues DetailSalt errors:
I'm preparing for an infosec event where I will have four teams - each with their own Security Onion instance and their own LAN/DMZ network segments to monitor. I'm running into issues for each of the four teams when I try to get OSquery agents installed on the DMZ systems (but not the LAN). It looks to be firewall related as those DMZ systems can ssh/web browse/etc other LAN systems without any issues. Additionally, there are zero firewall rules at the router between each LAN/DMZ pair. My question is this - what is the correct way to add more than one IP/CIDR block to the Currently, I have the following (where
OSquery logs seem to indicate connectivity issues - I can confirm that attempting to manually curl the urls below times out.
Is there something else I'm missing? Is my Firewall config incorrect? EDIT: I've double checked and DNS resolves from the DMZ systems, it really does seem to just be the Security Onion firewall, I'm not sure how best to proceed. Guidelines
|
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 5 replies
-
Your #1720 reference link is for the old SO2.3.x version. The 2.4.x is a little different where the firewall is done at the SOC gui. I believe osquery is part of the elastic_agent so with that said: |
Beta Was this translation helpful? Give feedback.
-
So I ended up finding the problem - I'm not sure how those extra interfaces monitoring got IP addresses - but that caused some asymmetric routing issues. DMZ hosts were going through our pfsense box to the LAN seconion, but since the seconion box had an interface with an IP on the DMZ, it wouldn't travers the pfsense on the way back. We discovered the fix on accident while forcing those nics into monitoring mode with |
Beta Was this translation helpful? Give feedback.
So I ended up finding the problem - I'm not sure how those extra interfaces monitoring got IP addresses - but that caused some asymmetric routing issues. DMZ hosts were going through our pfsense box to the LAN seconion, but since the seconion box had an interface with an IP on the DMZ, it wouldn't travers the pfsense on the way back.
We discovered the fix on accident while forcing those nics into monitoring mode with
sudo so-monitor-add ens224
- after seconion didn't have an interface with an IP on the DMZ, everything functioned as expected.