Logging Network Firewall Stateful rule logs

0

maybe i already got an answer in my mind but still ill left this question here.

My team try to deploy AWS native network firewall insted of 3rd party firewall like Fortinet, Paloalto to our customer.

So we currently working on various case scenario with rules. and what make us bugging is standard rules like rules inside 5-tuple-rule groups seem to not have ability to left their rule id or something like that on log regardless of its alert or just flow.

Im sure this could be a huge pain in the a@# to the infra/security administrator when they dealing with trouble shooting some traffic flow related issues.

So what i want to know is is there any CLI hidden options to enable rule id or again Suricata custom rule is the answer?

V
demandé il y a un an330 vues
1 réponse
0
Réponse acceptée

To log custom messages, you can use the "msg" keyword in Suricata rules, see here.

AWS
Vincent
répondu il y a un an
  • thanks for the answer, another 'V'. i was expect suricata is only option in this scenario too :)

Vous n'êtes pas connecté. Se connecter pour publier une réponse.

Une bonne réponse répond clairement à la question, contient des commentaires constructifs et encourage le développement professionnel de la personne qui pose la question.

Instructions pour répondre aux questions