Logging Network Firewall Stateful rule logs

0

maybe i already got an answer in my mind but still ill left this question here.

My team try to deploy AWS native network firewall insted of 3rd party firewall like Fortinet, Paloalto to our customer.

So we currently working on various case scenario with rules. and what make us bugging is standard rules like rules inside 5-tuple-rule groups seem to not have ability to left their rule id or something like that on log regardless of its alert or just flow.

Im sure this could be a huge pain in the a@# to the infra/security administrator when they dealing with trouble shooting some traffic flow related issues.

So what i want to know is is there any CLI hidden options to enable rule id or again Suricata custom rule is the answer?

V
已提問 1 年前檢視次數 330 次
1 個回答
0
已接受的答案

To log custom messages, you can use the "msg" keyword in Suricata rules, see here.

AWS
Vincent
已回答 1 年前
  • thanks for the answer, another 'V'. i was expect suricata is only option in this scenario too :)

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南