OPNsense: Setting up basic Firewall

1
27520

Security concerns prompt the securing of networks against hacking and intrusion. OPNsense is an open source, FreeBSD based firewall and routing platform. It includes most of the features available in expensive commercial firewalls, and often even more. It combines the rich feature set of commercial offerings with the benefits of open and verifiable sources.

Network monitoring, traffic investigation, packet analysis and developing robust firewalls are the key aspects of digital forensics because of increasing threats and vulnerabilities. Efforts are being made to develop and deploy fully secured network infrastructure, but the escalating incidents of cyber terrorism and cracking attempts need constant alertness.

Figure 1
Figure 1: OPNsense, a free and powerful open source firewall solution
Figure 2
Figure 2: SSL integration with OPNsense

While a number of software as well as hardware components with the latest updates are released frequently, yet, there is a need to be conscious of every aspect of security. Proprietary firewalls and security devices are used in the corporate world as well as by government organisations, but these are very costly in terms of annual maintenance as well as the initial one-time investment.

In classical methods of implementation, network administrators make use of packet capturing tools and intrusion detection systems for deep analysis of the packets flowing in the network. These network administration and forensic activities are implemented using PCAP and related IDS tools, which include free and open source software as well as commercial proprietary products.

The key WinPcap/libpcap software suites working with PCAP at the base level include:

WinDump  Snort  ngrep
 Wireshark  Nmap  L0phtCrack
 Bro IDS  XLink Kai  iftop
 EtherApe  URL Snooper  Kismet
 Tcpdump   Bit-Twist  Pirni
 Suricata  NetSim  Firesheep
 WhatPulse  Xplico  Scapy

There are a number of intrusion detection systems (IDS) used in corporate as well as research organisations to enforce and implement threat analysis and digital security. Some of these IDS products are:

AIDE  Samhain  OpenDLP
 OSSEC  Security Onion  OpenWIPS-NG
 ACARM-ng  Fail2ban  OSSEC HIDS
 Bro NIDS  Prelude Hybrid IDS  Samhain
 Snort  Suricata

OPNsense: A free and open source firewall
URL: opnsense.org
OPNsense is a powerful and user-friendly firewall as well as a routing platform for network security and cyber forensic investigation. It is free, open source and is available under the FreeBSD licence. It has excellent features to guard the network against assorted attacks and malicious intrusions.

Figure 3
Figure 3: User interface of OPNsense
Figure 4
Figure 4: General settings in OPNsense

OPNsense has most of the secured modules and features that are normally only available with the very expensive proprietary and commercial firewall systems. It has the Bootstrap Framework based GUI that has a Web based interface to enable and deliver the easy-to-use platform without any complexities.

The core powerful features of OPNsense include:

  • Forward caching proxy and blacklisting
  • Rule based traffic transmission
  • Traffic shaper
  • Supports IP-less firewalls

You may refer to the website and the various resources available on the Internet for more features.

Installation and working with OPNsense
A USB memstick installer can be used. Simply write the downloaded image to a USB drive or hard disk and the steps shown below can be followed.

For FreeBSD, type:

dd if=OPNsenseVERSION of=/dev/daX bs=16k

For Linux, the command is:

dd if=OPNsenseVERSION of=/dev/sd(IDE-Device) bs=16k

For OpenBSD, type:

dd if=OPNsenseVERSION of=/dev/rsd6c bs=16k

The command for Mac OS X is:

sudo dd if=OPNsense img of=/dev/<RawDevice>disk<DiskDeviceNumber> bs=64k

For Windows, type:

physdiskwrite -u OPNsenseVERSION
Figure 5
Figure 5: Firewall and related dimensions in OPNsense
Figure 6
Figure 6: Setting up of the IDS and IPS in OPNsense
Figure 7
Figure 7: Rules status

Integration with OpenSSL / LibreSSL

The OPNsense images are integrated with OpenSSL and can be selected on demand. LibreSSL is usable and selected from the GUI as System -> Settings -> General.

The default user name in OPNsense is root and the password is opnsense.

Key components and the GUI of OPNsense
Lobby: Click on the OPNsense logo in the interface and navigate the Lobby as well as the dashboard directly.
From OPNsense Lobby, the following options can be selected:

  • Dashboard
  • Widgets
  • Licence information
  • Change password credentials
  • Logout

Menu: From Menu, the network administrator can select the various security and configuration features to be changed and customised.
There are three levels of layers in Menu:

  • Category level
  • Function level
  • Configuration level

The depiction shown in Figure 4 directs the user to change the settings and then select from the firewall.

Settings -> General

Setting up the IDS and intrusion prevention system
To enforce and enable the IDS/IPS, select Services -> Intrusion Detection and then enable the IPS mode.
The sets of rules can be configured for different modules.

Scheduling: Scheduling is very important in network monitoring and control, so that a regular and timely fetching or sync can be done with the server.
Click on Schedule. A new pop-up window is generated with a number of options.

Figure 8
Figure 8: Scheduling and Auto Run
Figure 9
Figure 9: Configuration of the anti-malware engine in OPNsense

Setting up an anti-virus engine with OPNsense

OPNsense provides the excellent and powerful standard ICAP (Internet Content Adaptation Protocol) for protection of HTTP as well as HTTPS traffic connections against assorted malware including trojans, botnets, malware, viruses and many others. It has an effective communication layer with third party engines including the Symantec Protection Engine.

After selecting the anti-malware engine, configuration is required. To encrypt the traffic with ICAP, there is a need to implement VLAN because the traffic in ICAP is not encrypted by default.

To configure ICAP, the navigation is Services->Proxy->Administration. Then select ICAP Settings for the Forward Proxy tab.

Previous articleGetting started with Docker Swarm
Next articleNext Android version to have Nougat flavour
The author is the managing director of Magma Research and Consultancy Pvt Ltd, Ambala Cantonment, Haryana. He has 16 years experience in teaching, in industry and in research. He is a projects contributor for the Web-based source code repository SourceForge.net. He is associated with various central, state and deemed universities in India as a research guide and consultant. He is also an author and consultant reviewer/member of advisory panels for various journals, magazines and periodicals. The author can be reached at kumargaurav.in@gmail.com.

1 COMMENT

LEAVE A REPLY

Please enter your comment!
Please enter your name here