2- In this mode, need Suricata-IDS any special changes in its configuration?
3- Should I install any web server software like Apache or etc on Suricata-IDS server?
Hello,
Should I set the web server public IP address on the IDS/IPS server and it forward all requests to my web server with a local IP address?
I’m thankful if anyone provide some advice.
The MASQUERADE policy is usually applied by a router that has been assigned a dynamic IP under the influence of DHCP. Representatively, you can think of the WiFi AP in your home.
The mentioned topology configuration is too simple. If Suricata operates as a part of UTM, you can consider MASQUERADE in iptables, but this is not necessary for Suricata configuration.
For detailed policy, what topology is planned, L3 (Router), NAT, Suricata’s Inline or TAP (Mirror), etc. are required.
Thank you for your info.
I have a web server and I don’t like to install Suricata-IDS on it. I want to dedicate a server for Suricata-IDS and it filter traffics, then forward it to my real server:
The Internet --> Suricata-IDS --> Apache Web Server
I don’t know how to configure Suricata-IDS for this scenario!
If it is IPS (inline) mode and the Apache server is Public, it is recommended to use suricata’s af-packet configuration without iptables.
If you are already in a NAT (ex. Home Wifi) network environment, you can configure and use only af-packet without iptables in Suricata located behind NAT.
The server that I dedicated to Suricata-IDS, not have any Apache. I want Suricata-IDS clean the traffic, then forward it to the Apache Server, thus Suricata-IDS has public IP and Apache server have a private IP.
I don’t know how to configure Suricata-IDS to do these tasks!
I know how to configure Suricata-IDS in IPS mode, but how my Suricata-IDS server must forward the traffics to the real Apache server after cleaned it? I think Suricata-IDS must act like a Reverse Proxy!!!
A server with only Suricata-IDS installed acts like a bridge and filters packets. It doesn’t play a role for forwarding like routing or proxy. There is no need to act as a reverse proxy.
Why do you think the reverse proxy should work?
Suricata in “IDS” mode will never forward packets. What you’re looking for is “IPS” mode where Suricata operates “in-line” receiving packets, processing them, and then releasing for transmit those packets that are not dropped.