Best way to update suricata ruleset (From ET-OPEN to ET-PRO), in AIRGAP mode #6092
-
Hi! None of nodes, including the management node have internet access. We would like to switch from the ET-OPEN ruleset to the ET-PRO ruleset. We have a 30 day trial and downloaded the etpro.rules.tar.gz from the Emerging Threat's website using the $oinkcode and $version. Now that I have the rules, what is the best way for me to update my sensor with this set? Thanks for your help, Much appreciated. |
Beta Was this translation helpful? Give feedback.
Replies: 4 comments 2 replies
-
In airgap mode, NIDS rules are normally updated when you run Based on that (but without actual testing), I would think that you could manually sneakernet your new ruleset to |
Beta Was this translation helpful? Give feedback.
-
Hey All, Im also interested in the answer to this. I can verify that the answer given did not work for me. I downloaded the etpro.rules.tar.gz file as we also have an ET PRO License. I untard the tar.gz file into /nsm/repo/rules and ran sudo so-rule-update and then results were exactly the same as I ran a sudo so-rule update and gathered the results before untaring the current rules file. I look forward to hearing about how we would do this, as we also have an airgapped installation. Cheers kl3ss |
Beta Was this translation helpful? Give feedback.
-
Hey All, After digging down a rabbit hole, My findings are that there is a file under /opt/so/idstools/etc/ called rulecat.conf. Would it be safe to say that the following would need to be done if updating signature updates for suricata in a airgapped install: -: Copy rulecat.conf into /opt/so/saltstack/local/salt/idstools/etc/ I have not tried this, and would be nice if someone could come back and confirm that this may be correct? Cheers kl3ss |
Beta Was this translation helpful? Give feedback.
-
Hey All, Need an answer to this one, thank you. I have installed Securityonion 2.3.5 recently with Snort Subscriber Ruleset. The setup works fine, but I also want to enable ET OPEN rulesets along with the current Snort rulesets. Can someone let me know how to enable them as I have gone through the documentation but could not understand how to enable them? Previously, in Securityonon 16, both rulesets were selected in the initial setup. For this version, please let me know how to do it, many thanks. |
Beta Was this translation helpful? Give feedback.
In airgap mode, NIDS rules are normally updated when you run
soup
and it copies them from the new ISO image to/nsm/repo/rules/
:https://github.com/Security-Onion-Solutions/securityonion/blob/master/salt/common/tools/sbin/soup#L719
Based on that (but without actual testing), I would think that you could manually sneakernet your new ruleset to
/nsm/repo/rules/
.