iptables
If you have Linux iptables firewalls on your network, you can send those logs to Security Onion. To get those iptables logs into Elasticsearch, you’ll need to add the Elastic integration for iptables and then configure the Security Onion firewall to allow the remote firewall to send its logs.
Add the iptables integration
First, add the Elastic integration for iptables.
Note
For more information about the iptables integration, please see https://www.elastic.co/docs/reference/integrations/iptables.
Go to Elastic Fleet, click the
Agent policiestab, and then click the desired policy (for exampleso-grid-nodes_general).Click the
Add integrationbutton.Search for
iptablesand then click on theiptablesintegration.The Elastic Integration page will show an overview of the iptables Integration. Review all information on the page and then click the
Add iptablesbutton.On the
Add iptables integrationscreen, disable the options labeledCollect iptables application logs (input: logfile)andCollect iptables application logs (input: journald). Make sure thatCollect iptables application logs (input: udp)is enabled and then change theSyslog hostsetting fromlocalhostto0.0.0.0. TheSyslog Portshould be set to9001by default. Click theSave and continuebutton and then clickSave and deploy changes.
Allow iptables logs through firewall
Next, allow the traffic from the iptables host through the firewall to the iptables integration port.
Note
The following instructions assume that this is the first firewall change you have made and therefore refer to customhostgroup0 and customportgroup0. If those have already been used, you can select the next available hostgroup and portgroup.
Navigate to Administration –> Configuration.
At the top of the page, click the
Optionsmenu and then enable theShow advanced settingsoption.On the left side, go to
firewall, selecthostgroups, and click thecustomhostgroup0group. On the right side, enter the IP address of the iptables host and click the checkmark to save.On the left side, go to
firewall, selectportgroups, select thecustomportgroup0group, and then clickudp. On the right side, enter your desired listener port (9001 by default) and click the checkmark to save.On the left side, go to
firewall, selectrole, and then select the node type that will receive the iptables logs. Then drill intochain–>INPUT–>hostgroups–>customhostgroup0–>portgroups. On the right side, entercustomportgroup0and click the checkmark to save.If you would like to apply the rules immediately, click the
SYNCHRONIZE GRIDbutton under theOptionsmenu at the top of the page.
iptables dashboard
Once all configuration is complete, you should be able to go to Dashboards and select the Firewall - iptables dashboard to see your iptables logs.