OPNsense Integration Guide
Overview
OPNsense does not natively support forwarding IDS events directly to an HTTP destination. To integrate with NxtFireGuard, you'll use a Threat Feed Aggregator as an intermediary. This guide walks you through configuring OPNsense's Suricata IDS to forward events to NxtFireGuard via Syslog.
What You'll Need
- A running OPNsense instance with Suricata enabled
- A separate server with Docker installed to host the Threat Feed Aggregator
Prerequisites
- Suricata is installed and operational on your OPNsense instance
- EVE JSON logging is enabled in Suricata (see Step 1 below)
- A server with Docker available for the Threat Feed Aggregator
Integration Architecture
OPNsense logs Suricata IDS events via EVE JSON, which are then forwarded over Syslog (UDP) to your Threat Feed Aggregator. The aggregator processes and forwards these threat events to NxtFireGuard's ingestion endpoint.
OPNsense (Suricata / EVE JSON)
↓ Syslog UDP :1026
Threat Feed Aggregator
↓ HTTPS
NxtFireGuard
Setup Instructions
Step 1: Set Up a Threat Feed Aggregator
Before configuring OPNsense, you'll need a running Threat Feed Aggregator with Syslog enabled.
- In your NxtFireGuard Dashboard, navigate to Data Ingestion → Feed Aggregators
- Click Create Aggregator and give it a descriptive name
- During setup, ensure Enable Syslog is toggled on
- Complete the creation process and follow the provided installation guide to deploy the aggregator on your Docker host
Step 2: Enable EVE JSON Logging in Suricata
EVE JSON logging must be enabled for OPNsense to produce structured IDS event output.
- In OPNsense, navigate to Services → Intrusion Detection → Administration
- Ensure Enable syslog alerts and Enable eve syslog output are enabled
- Save your changes
You can verify that alerts are being generated by visiting the Alerts tab in the Intrusion Detection section.
Step 3: Configure Remote Syslog Forwarding
With EVE logging active, configure OPNsense to forward Suricata logs to your Threat Feed Aggregator.
- Navigate to System → Settings → Logging → Remote
- Click Add to create a new log destination
- Configure the destination with the following settings:
| Field | Value |
|---|---|
| Transport | UDP |
| Application | Suricata |
| Level | Info |
| Hostname / IP | IP or hostname of your Threat Feed Aggregator |
| Port | 1026 |
- Save the configuration
Step 4: Verify Data Flow
After completing the setup, allow a few minutes for the pipeline to establish, then verify that events are flowing through correctly.
- Navigate to Events → Threat Events in your NxtFireGuard Dashboard
- Check for incoming events from your OPNsense firewall
- You can also review Events → Processing for ingestion status
If events are appearing, your integration is working correctly.
Additional Resources
Support
For issues specific to:
- OPNsense / Suricata configuration — refer to the OPNsense documentation and community forums
- NxtFireGuard integration — contact NxtFireGuard support or visit the documentation portal