intrusion detection: syslog by default

This commit is contained in:
Franco Fichtner 2018-04-08 10:01:05 +00:00
parent 5dd172ed16
commit 0d79bfda3c
3 changed files with 2 additions and 13 deletions

View File

@ -17,12 +17,6 @@
<type>checkbox</type>
<help><![CDATA[Enable promiscuous mode, for certain setups (like IPS with vlans), this is required to actually capture data on the physical interface.]]></help>
</field>
<field>
<id>ids.general.syslog</id>
<label>Enable syslog</label>
<type>checkbox</type>
<help><![CDATA[Enable syslog, sends alerts (in fast log format) and messages to syslog. This won't change the alert logging used by the product itself.]]></help>
</field>
<field>
<id>ids.general.MPMAlgo</id>
<label>Pattern matcher</label>

View File

@ -172,10 +172,6 @@
</OptionValues>
<ValidationMessage>Please select a valid pattern matcher algorithm</ValidationMessage>
</MPMAlgo>
<syslog type="BooleanField">
<default>0</default>
<Required>Y</Required>
</syslog>
<LogPayload type="BooleanField">
<default>0</default>
<Required>Y</Required>

View File

@ -239,7 +239,7 @@ outputs:
# a line based alerts log similar to fast.log into syslog
- syslog:
enabled: {% if helpers.exists('OPNsense.IDS.general.syslog') and OPNsense.IDS.general.syslog|default('0') == '0' %}no{% else %}yes{% endif %}
enabled: yes
# reported identity to syslog. If ommited the program name (usually
# suricata) will be used.
#identity: "suricata"
@ -750,8 +750,7 @@ logging:
- console:
enabled: no
- syslog:
enabled: {% if helpers.exists('OPNsense.IDS.general.syslog') and OPNsense.IDS.general.syslog|default('0') == '0' %}no{% else %}yes{% endif %}
enabled: yes
facility: local5
format: "[%i] <%d> -- "