I want to run a IDS 24/7. I am using tzsp2pcap to pull in the stream from the router packet sniffer. Im then using SnortALog to generate reports via Cron. This is working pretty well so far. This is my first attempt at doing this. Is this the best way to do a NIDS with Mikrotik ?
Do I need to put a script to start the packet sniffer each time the router boots ?
Well OK I will let you know what I have experenced so far. Seems to work great. Ive had no issues. Snort is running and the router packet sniffer is set to feed all the interfaces to it except the one feed the FreeBSD server running Snort. You gotta exclude that port or a feedback loop is created.
I assume it is not forwarding packets that are hardware accelerated. This is a obvious issue and I will disable it and see if traffic changes..
Fast path / track being enabled is just a flag / toggle: allow it or not. Whether its actually used will depend on factors, such as if sniffer is running.
Also not that switched and hardware bridged traffic will not be seen by router either.
In the above pic, and in the packet stream, I can start up packet sniffer at start up and KEEP fasttrack running. As shown in the example pic. This seems wrong. It produces less packets.
If I then stop and then start packet sniffer the indicator for fasttrack goes off and I get a higher level of traffic sniffed.