rgnldo
Very Senior Member
Suricata is a free and open source, mature, fast and robust network threat detection engine.
The Suricata engine is capable of real time intrusion detection (IDS), inline intrusion prevention (IPS), network security monitoring (NSM) and offline pcap processing.
Suricata inspects the network traffic using a powerful and extensive rules and signature language, and has powerful Lua scripting support for detection of complex threats.
Suricata’s fast paced community driven development focuses on security, usability and efficiency.
IDS vs IPS
Not compatible with AiProtection Trend Micro and QoS Adaptive
ABOUT: I would like to inform you that all members who help in this thread are volunteers. Therefore, some problems may take a day or more to be answered. Wait patiently.
Instalation step:
Create Swap file
We will need the Entware-NG repository.
Suricata script installer
This repo includes support files used by suricata_manager.sh maintained by @juched https://github.com/juched78/suricata-merlin
Includes scripts to support features like:
Usage
Usage: suricata_manager ['help'|'-h'] | [ 'debug' ] [ 'install' | 'uninstall' | 'check' | 'stop' | 'start' | 'logs' | 'config[x]' | 'test' ]
suricata_manager config: View the suricata.yml file
suricata_manager configx: Edit the suricata.yml file
suricata_manager check: Syntax check the suricata.yml file
suricata_manager test: Generate a spoof HTTPS attack (To see it you will need to enable the http.log) uid=0(root) gid=0(root) groups=0(root)
suricata_manager logs: View the logs for activity
Optional:
Credits: @faux123
Fork FW Merlin adapted for Suricata.
WARNING: this is a GPL only release, meaning if you use this release with AdaptiveQoS or AiProtect (AiMesh is okay which I'm using myself).
Because Zswap is enabled by default. Add the following line to your script located in /jffs/scripts/post-mount
just before the swapon line. Zswap will use 25% of your RAM and using z3fold memory compression (about 2.6x compression ratio) to expand your RAM further. so 25% of 512MBytes, then 128Mbytes * 2.6 compression ratio = 332 MByte total compressed memory then add back to your remaining real RAM of 384 MBytes, you will have approximately 716 Mbytes of RAM to play with which helps the poor AC86U with just 512 MBytes of real RAM. This will help suricata a bit as suricata is a memory hog.
For Wireguard, please follow the wireguard post in the VPN forum, the only thing you need to change is to change the line in the wireguard shell scripts (located /opt/etc/wireguard/wg-up wg-policy wg-server) where you see:
so it uses the built-in kernel module rather than kernel module from Entware.
For CakeQos make the following change to /jffs/addons/cake-qos/cake-qos script where
Get faux123_fork_fw_merlin
Download and use at your own risk.
Enjoy!
The Suricata engine is capable of real time intrusion detection (IDS), inline intrusion prevention (IPS), network security monitoring (NSM) and offline pcap processing.
Suricata inspects the network traffic using a powerful and extensive rules and signature language, and has powerful Lua scripting support for detection of complex threats.
Suricata’s fast paced community driven development focuses on security, usability and efficiency.
IDS vs IPS
Not compatible with AiProtection Trend Micro and QoS Adaptive
ABOUT: I would like to inform you that all members who help in this thread are volunteers. Therefore, some problems may take a day or more to be answered. Wait patiently.
Instalation step:
Create Swap file
We will need the Entware-NG repository.
Suricata script installer
This repo includes support files used by suricata_manager.sh maintained by @juched https://github.com/juched78/suricata-merlin
Includes scripts to support features like:
- Install and Uninstall Suricata
- Auto update rules nightly at 3AM
- Collect Logs
- Display stats on UI
- Currently only supports Asus routers running Merlin firmware
- Asus QoS and AiProtection Trend Micro DISABLED
- Entware
- USB Storage
- JFFS Custom Scripts Enabled
- Run the installer:
Bash:
mkdir /jffs/addons 2>/dev/null;mkdir /jffs/addons/suricata 2>/dev/null; curl --retry 3 "https://raw.githubusercontent.com/juched78/suricata-merlin/master/suricata_manager.sh" -o "/jffs/addons/suricata/suricata_manager.sh" && chmod 755 "/jffs/addons/suricata/suricata_manager.sh" && /jffs/addons/suricata/suricata_manager.sh install
Usage
Usage: suricata_manager ['help'|'-h'] | [ 'debug' ] [ 'install' | 'uninstall' | 'check' | 'stop' | 'start' | 'logs' | 'config[x]' | 'test' ]
suricata_manager config: View the suricata.yml file
suricata_manager configx: Edit the suricata.yml file
suricata_manager check: Syntax check the suricata.yml file
suricata_manager test: Generate a spoof HTTPS attack (To see it you will need to enable the http.log) uid=0(root) gid=0(root) groups=0(root)
suricata_manager logs: View the logs for activity
Bash:
/opt/var/log/suricata/fast.log
Bash:
/opt/var/log/suricata/stats.log
Optional:
Credits: @faux123
Fork FW Merlin adapted for Suricata.
WARNING: this is a GPL only release, meaning if you use this release with AdaptiveQoS or AiProtect (AiMesh is okay which I'm using myself).
Because Zswap is enabled by default. Add the following line to your script located in /jffs/scripts/post-mount
echo 100 > /proc/sys/vm/swappiness
just before the swapon line. Zswap will use 25% of your RAM and using z3fold memory compression (about 2.6x compression ratio) to expand your RAM further. so 25% of 512MBytes, then 128Mbytes * 2.6 compression ratio = 332 MByte total compressed memory then add back to your remaining real RAM of 384 MBytes, you will have approximately 716 Mbytes of RAM to play with which helps the poor AC86U with just 512 MBytes of real RAM. This will help suricata a bit as suricata is a memory hog.
For Wireguard, please follow the wireguard post in the VPN forum, the only thing you need to change is to change the line in the wireguard shell scripts (located /opt/etc/wireguard/wg-up wg-policy wg-server) where you see:
Bash:
#insmod /opt/lib/modules/wireguard
insmod /lib/modules/4.1.27/kernel/net/wireguard/wireguard
For CakeQos make the following change to /jffs/addons/cake-qos/cake-qos script where
Bash:
#insmod /opt/lib/modules/sch_cake.ko 2>/dev/null
insmod /lib/modules/4.1.27/kernel/net/sch_cake/sch_cake.ko 2>/dev/null
Download and use at your own risk.
Enjoy!
Last edited: