-
Notifications
You must be signed in to change notification settings - Fork 48
Deployment Instructions
g3tsyst3m edited this page Jun 15, 2023
·
8 revisions
The crude layout below is how I have this configured for my personal deployment:
This setup will afford you with the following capture capabilities:
- Ability to capture information from outside attacks (portscans, web server attacks, etc) against your public IP/WAN interface
- Ability to capture device to device suspicious activity
- This includes virtual interface traffic such as wifi eth0.1, etc
- Ability to capture all Inbound and Outbound activity from your device ingress/egress points to and from your WAN
I have a cable modem in bridge mode so the ISP connection passes through my modem and is managed by my tomato wifi router. Tomato will copy/tee all packets to your suricata listening interface (eth0). This is assuming your tomato configuration is setup according to the instructions on this wiki page: https://github.com/g3tsyst3m/BriarIDS/wiki/Tomato-config-instructions-setup