How to import snort or suricata signature automatically into Panorama by Web interface

How to import snort or suricata signature automatically into Panorama by Web interface

41501
Created On 09/26/20 15:48 PM - Last Modified 12/21/20 17:39 PM


Objective


 Automatically import snort or Suricata IPS signature into PaloAlto device. 

Environment


PAN-OS 10.0 or higher
 


Procedure


A third party(Snort/Suricata) signature conversion into the PaloAlto Networks' custom signature depends on the PAN-OS version. 
Note: For the PAN-OS version lower than 10.00, you can create a set of customer signatures. This knowledge base articles explain in detail. 

For PAN-OS version 10.0 or higher, The IPS Signature Converter plugin for Panorama can automatically convert Snort/Suricata's rules into a custom Palo Alto Networks threat signature. Once this signature is converted, you can import them into your device group. Here is the summary of the three steps and a detailed description follows. 
  1. Install the IPS Signature Converter plugin on Panorama.
  2. Upload rules in the Panorama for conversion and import rules to your device groups.
  3. Push the vulnerability rules to the Firewall using Panorama. 
Step-1:  Install the IPS Signature Converter plugin on Panorama.
  1. Requirements:
    1. Plugin version: 1.0.1 or higher
    2. Minimum Panorama and Firewall version: 10.0.0
    3. Latest application and threat content updates
    4. The only text file can be used for signature upload, pdf and doc are not allowed. 
    5. Only 100 signatures per file. 
  2. Steps:
    1. Select Panorama-> Plugins and enter ips_signature_converter
       in the search bar.
    2. Select the highest version, select download the plugin, and install. Please select the latest version.
    3. Once the plugin is installed you will see 
Panorama plugin installed
 
Step-2: 
Upload rules in the Panorama for conversion.
1. You can select two methods to upload the snort signature, either using the Web interface or CLI.
2. On Web interface -> select Panorama tab-> select IPS Signature Converter on left pane -> Manage
3. A window will pop up as shown in the following screen capture. 
User-added image
 
4. You can select either a file or copy/paste the signature. Remember the restriction, (a) only text file can be used and (b) only 100 signatures per file.
User-added image
 
5. Click on convert, it will take a few minutes and the signature will be converted with a status message. 
User-added image
 
7. The signature import status message can be as following.
SuccessSuccessfully converted 
Success with Warnings Successfully converted with warnings
FailedSyntax issue or other issues, no conversion
Duplicate No conversion
Existing coverage Converted successfully with a signature that already exists
6. Now select the rule, click on import signature, and click on import the signature.
User-added image
User-added image
8. You can see these imported rules in the custom vulnerabilities or spyware depending on the signature.
User-added image

10. Exporting those third-party signatures are purely based on the static IP addresses, IP range, domain, or URL in a text-based file; that text-based file can be added to an External Dynamic List (EDL). This kind of signature does not contain keywords such as "content" or "PCRE"
11. The name of such rule contains the word "IOC .."  
12. You need to convert such rules too.
 
  Step-3: Push the vulnerability objects into your device group and push them to the Firewall.


Additional Information


  • You can convert the rules using the panorama CLI, and the refer PAN-OS document can be found here
  • You can convert the rules using the panorama API, and the refer PAN-OS document can be found here


Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HAu0CAG&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language