OPNsenseLab
Security

OPNsense Suricata IDS/IPS: Installation and Tuning Guide

Set up Suricata as an inline IPS on OPNsense — install the plugin, enable ET Open or ET Pro rulesets, configure alert actions, and tune to reduce false positives.

By OPNsenseLab Editorial · · 8 min read

Suricata is OPNsense’s built-in network IDS/IPS engine. Running it inline (IPS mode) drops malicious traffic in-band. This guide covers setup from scratch through basic tuning.

Hardware requirements

Suricata is CPU-intensive. Inline IPS on a 1 Gbps WAN needs at least:

On a Protectli FW4C (J3160), expect ~250–400 Mbps throughput with ET Open rules before CPU saturation.

Install the plugin

System → Firmware → Plugins → search os-suricata → Install.

After install: Services → Intrusion Detection → Administration.

Configure interfaces

On the Settings tab:

Enable rulesets

On the Download tab:

RulesetCostNotes
ET OpenFreeGood baseline, delayed vs ET Pro by 30 days
ET Pro~$600/yrReal-time, full threat intel
Abuse.ch SSL BlacklistFreeSSL cert-based C2 detection
Abuse.ch URLhausFreeMalware URL blocking

Enable ET Open + both Abuse.ch feeds for a free starting point. Click Download & Update Rules.

Alert vs Drop

Rules have two modes:

Start with Alert for 1–2 weeks, review the alert log, then move clean-looking rules to Drop.

Tuning false positives

In the Rules tab, filter by SID to suppress noisy rules:

# Common high-noise rules to review first:
ET POLICY DNS Query to .TK domain
ET POLICY Dropbox Client Observed
ET INFO Executable Download

For known-good internal services triggering rules: add a passlist (Intrusion Detection → Passlist).

Monitoring alerts

Services → Intrusion Detection → Alerts. Key columns: timestamp, SID, severity, source/dest IP.

For persistent monitoring, ship logs to Grafana/Loki or a syslog target (System → Settings → Logging).

Want a platform comparison? FirewallCompare has OPNsense vs pfSense IDS throughput benchmarks.

#opnsense #suricata #ids #ips #security #intrusion-detection

Related

Comments