Question about my sys-net-monitor configuration

Hey! First post, but have been lurking and troubleshooting here for close to a year now…

Anyway, I had this idea to create an network attached appvm that monitors network traffic using programs like Etherape and Wireshark but also doubles as a system wide VPN tunnel…

I created a sys-net-mon from a kicksecure template, installed Etherape, Wireshark, NorskVPN GUI and UFW. I set UFW to deny all inbound by default, and I’m not sure if this is correct practice or not, but I also set IP-Tables rules such as drop all inbound and allow loopback and I used IP-Tables-Persistent and Net-Filter-Persistent to enable the rules…

Now heres my question… I have sys-net-mon in-between sys-net and sys-firewall as my thought process was that I want to inspect all connections and packets across all qubes and tunnel all traffic through a system-wide VPN with TOR running on top.

It works. It works great. But is it good practice?

Is it wise to have an appvm connected directly to sys-net, or would it be smarter to put sys-net-mon on top of sys-firewall and monitor traffic on a per qube basis connecting qubes to sys-net-mon instead of sys-firewall…

I’m an intermediate user and am still getting used to the quirks and am no expert on networking or whatever, but i like the way my system is at the moment but fear I am putting my station at rist by having an appvm connected directly to sys-net and running sys-firewall off that…

But I tell ya… When I fire up Etherape and see that one green line that expands and contracts with network activity from all qubes being tunneled is a great feeling… I just hope I haven’t put my entire system at risk by doing this…

Any input would be appreciated or suggestions for a better way and correct practice…

Cheers :slight_smile:

Just a drive-by observation, general best practice would be to not connect anything to sys-net directly unless it’s for specific purpose. If you want your sys-net-mon qube to scan & tunnel all traffic, perhaps you could do:

sys-net <-> sys-firewall-1 <-> sys-net-mon <-> sys-firewall-2 <-> [other qubes]

That is, add an extra sys-firewall intermediary.

How did you setup the networking on the mon qube, you need a lan side for incoming and a wan side for outgoing.
You have two physical or logical network cards ?

It’s part of the netvm chain.