mirror of
https://github.com/lucaspalomodevelop/core.git
synced 2026-03-14 00:24:40 +00:00
(ids) update config template
This commit is contained in:
parent
487a9a69e7
commit
18b0bb46a3
@ -37,7 +37,7 @@
|
||||
# If set to auto, the variable is internally switch to 'router' in IPS mode
|
||||
# and 'sniffer-only' in IDS mode.
|
||||
# This feature is currently only used by the reject* keywords.
|
||||
host-mode: auto
|
||||
host-mode: sniffer-only
|
||||
|
||||
# Run suricata as user and group.
|
||||
#run-as:
|
||||
@ -77,7 +77,7 @@ outputs:
|
||||
|
||||
# a line based alerts log similar to Snort's fast.log
|
||||
- fast:
|
||||
enabled: yes
|
||||
enabled: no
|
||||
filename: fast.log
|
||||
append: yes
|
||||
#filetype: regular # 'regular', 'unix_stream' or 'unix_dgram'
|
||||
@ -94,23 +94,23 @@ outputs:
|
||||
## Error, Warning, Notice, Info, Debug
|
||||
types:
|
||||
- alert
|
||||
- http:
|
||||
extended: yes # enable this for extended logging information
|
||||
# custom allows additional http fields to be included in eve-log
|
||||
# the example below adds three additional fields when uncommented
|
||||
#custom: [Accept-Encoding, Accept-Language, Authorization]
|
||||
- dns
|
||||
- tls:
|
||||
extended: yes # enable this for extended logging information
|
||||
- files:
|
||||
force-magic: no # force logging magic on all logged files
|
||||
force-md5: no # force logging of md5 checksums
|
||||
#- drop
|
||||
- ssh
|
||||
# - http:
|
||||
# extended: yes # enable this for extended logging information
|
||||
# # custom allows additional http fields to be included in eve-log
|
||||
# # the example below adds three additional fields when uncommented
|
||||
# #custom: [Accept-Encoding, Accept-Language, Authorization]
|
||||
# - dns
|
||||
# - tls:
|
||||
# extended: yes # enable this for extended logging information
|
||||
# - files:
|
||||
# force-magic: no # force logging magic on all logged files
|
||||
# force-md5: no # force logging of md5 checksums
|
||||
# #- drop
|
||||
# - ssh
|
||||
|
||||
# alert output for use with Barnyard2
|
||||
- unified2-alert:
|
||||
enabled: yes
|
||||
enabled: no
|
||||
filename: unified2.alert
|
||||
|
||||
# File size limit. Can be specified in kb, mb, gb. Just a number
|
||||
@ -138,7 +138,7 @@ outputs:
|
||||
|
||||
# a line based log of HTTP requests (no alerts)
|
||||
- http-log:
|
||||
enabled: yes
|
||||
enabled: no
|
||||
filename: http.log
|
||||
append: yes
|
||||
#extended: yes # enable this for extended logging information
|
||||
@ -307,76 +307,8 @@ nflog:
|
||||
# netlink max buffer size
|
||||
max-size: 20000
|
||||
|
||||
# af-packet support
|
||||
# Set threads to > 1 to use PACKET_FANOUT support
|
||||
af-packet:
|
||||
- interface: eth0
|
||||
# Number of receive threads (>1 will enable experimental flow pinned
|
||||
# runmode)
|
||||
threads: 1
|
||||
# Default clusterid. AF_PACKET will load balance packets based on flow.
|
||||
# All threads/processes that will participate need to have the same
|
||||
# clusterid.
|
||||
cluster-id: 99
|
||||
# Default AF_PACKET cluster type. AF_PACKET can load balance per flow or per hash.
|
||||
# This is only supported for Linux kernel > 3.1
|
||||
# possible value are:
|
||||
# * cluster_round_robin: round robin load balancing
|
||||
# * cluster_flow: all packets of a given flow are send to the same socket
|
||||
# * cluster_cpu: all packets treated in kernel by a CPU are send to the same socket
|
||||
cluster-type: cluster_flow
|
||||
# In some fragmentation case, the hash can not be computed. If "defrag" is set
|
||||
# to yes, the kernel will do the needed defragmentation before sending the packets.
|
||||
defrag: yes
|
||||
# To use the ring feature of AF_PACKET, set 'use-mmap' to yes
|
||||
use-mmap: yes
|
||||
# Ring size will be computed with respect to max_pending_packets and number
|
||||
# of threads. You can set manually the ring size in number of packets by setting
|
||||
# the following value. If you are using flow cluster-type and have really network
|
||||
# intensive single-flow you could want to set the ring-size independantly of the number
|
||||
# of threads:
|
||||
#ring-size: 2048
|
||||
# On busy system, this could help to set it to yes to recover from a packet drop
|
||||
# phase. This will result in some packets (at max a ring flush) being non treated.
|
||||
#use-emergency-flush: yes
|
||||
# recv buffer size, increase value could improve performance
|
||||
# buffer-size: 32768
|
||||
# Set to yes to disable promiscuous mode
|
||||
# disable-promisc: no
|
||||
# Choose checksum verification mode for the interface. At the moment
|
||||
# of the capture, some packets may be with an invalid checksum due to
|
||||
# offloading to the network card of the checksum computation.
|
||||
# Possible values are:
|
||||
# - kernel: use indication sent by kernel for each packet (default)
|
||||
# - yes: checksum validation is forced
|
||||
# - no: checksum validation is disabled
|
||||
# - auto: suricata uses a statistical approach to detect when
|
||||
# checksum off-loading is used.
|
||||
# Warning: 'checksum-validation' must be set to yes to have any validation
|
||||
#checksum-checks: kernel
|
||||
# BPF filter to apply to this interface. The pcap filter syntax apply here.
|
||||
#bpf-filter: port 80 or udp
|
||||
# You can use the following variables to activate AF_PACKET tap od IPS mode.
|
||||
# If copy-mode is set to ips or tap, the traffic coming to the current
|
||||
# interface will be copied to the copy-iface interface. If 'tap' is set, the
|
||||
# copy is complete. If 'ips' is set, the packet matching a 'drop' action
|
||||
# will not be copied.
|
||||
#copy-mode: ips
|
||||
#copy-iface: eth1
|
||||
- interface: eth1
|
||||
threads: 1
|
||||
cluster-id: 98
|
||||
cluster-type: cluster_flow
|
||||
defrag: yes
|
||||
# buffer-size: 32768
|
||||
# disable-promisc: no
|
||||
# Put default values here
|
||||
- interface: default
|
||||
#threads: 2
|
||||
#use-mmap: yes
|
||||
|
||||
legacy:
|
||||
uricontent: enabled
|
||||
uricontent: disabled
|
||||
|
||||
# You can specify a threshold config file by setting "threshold-file"
|
||||
# to the path of the threshold config file:
|
||||
@ -782,7 +714,7 @@ logging:
|
||||
# disabled you will get the default - console output.
|
||||
outputs:
|
||||
- console:
|
||||
enabled: yes
|
||||
enabled: no
|
||||
- file:
|
||||
enabled: yes
|
||||
filename: /var/log/suricata.log
|
||||
@ -791,101 +723,6 @@ logging:
|
||||
facility: local5
|
||||
format: "[%i] <%d> -- "
|
||||
|
||||
# Tilera mpipe configuration. for use on Tilera TILE-Gx.
|
||||
mpipe:
|
||||
|
||||
# Load balancing modes: "static", "dynamic", "sticky", or "round-robin".
|
||||
load-balance: dynamic
|
||||
|
||||
# Number of Packets in each ingress packet queue. Must be 128, 512, 2028 or 65536
|
||||
iqueue-packets: 2048
|
||||
|
||||
# List of interfaces we will listen on.
|
||||
inputs:
|
||||
- interface: xgbe2
|
||||
- interface: xgbe3
|
||||
- interface: xgbe4
|
||||
|
||||
|
||||
# Relative weight of memory for packets of each mPipe buffer size.
|
||||
stack:
|
||||
size128: 0
|
||||
size256: 9
|
||||
size512: 0
|
||||
size1024: 0
|
||||
size1664: 7
|
||||
size4096: 0
|
||||
size10386: 0
|
||||
size16384: 0
|
||||
|
||||
# PF_RING configuration. for use with native PF_RING support
|
||||
# for more info see http://www.ntop.org/PF_RING.html
|
||||
pfring:
|
||||
- interface: eth0
|
||||
# Number of receive threads (>1 will enable experimental flow pinned
|
||||
# runmode)
|
||||
threads: 1
|
||||
|
||||
# Default clusterid. PF_RING will load balance packets based on flow.
|
||||
# All threads/processes that will participate need to have the same
|
||||
# clusterid.
|
||||
cluster-id: 99
|
||||
|
||||
# Default PF_RING cluster type. PF_RING can load balance per flow or per hash.
|
||||
# This is only supported in versions of PF_RING > 4.1.1.
|
||||
cluster-type: cluster_flow
|
||||
# bpf filter for this interface
|
||||
#bpf-filter: tcp
|
||||
# Choose checksum verification mode for the interface. At the moment
|
||||
# of the capture, some packets may be with an invalid checksum due to
|
||||
# offloading to the network card of the checksum computation.
|
||||
# Possible values are:
|
||||
# - rxonly: only compute checksum for packets received by network card.
|
||||
# - yes: checksum validation is forced
|
||||
# - no: checksum validation is disabled
|
||||
# - auto: suricata uses a statistical approach to detect when
|
||||
# checksum off-loading is used. (default)
|
||||
# Warning: 'checksum-validation' must be set to yes to have any validation
|
||||
#checksum-checks: auto
|
||||
# Second interface
|
||||
#- interface: eth1
|
||||
# threads: 3
|
||||
# cluster-id: 93
|
||||
# cluster-type: cluster_flow
|
||||
# Put default values here
|
||||
- interface: default
|
||||
#threads: 2
|
||||
|
||||
pcap:
|
||||
- interface: eth0
|
||||
# On Linux, pcap will try to use mmaped capture and will use buffer-size
|
||||
# as total of memory used by the ring. So set this to something bigger
|
||||
# than 1% of your bandwidth.
|
||||
#buffer-size: 16777216
|
||||
#bpf-filter: "tcp and port 25"
|
||||
# Choose checksum verification mode for the interface. At the moment
|
||||
# of the capture, some packets may be with an invalid checksum due to
|
||||
# offloading to the network card of the checksum computation.
|
||||
# Possible values are:
|
||||
# - yes: checksum validation is forced
|
||||
# - no: checksum validation is disabled
|
||||
# - auto: suricata uses a statistical approach to detect when
|
||||
# checksum off-loading is used. (default)
|
||||
# Warning: 'checksum-validation' must be set to yes to have any validation
|
||||
#checksum-checks: auto
|
||||
# With some accelerator cards using a modified libpcap (like myricom), you
|
||||
# may want to have the same number of capture threads as the number of capture
|
||||
# rings. In this case, set up the threads variable to N to start N threads
|
||||
# listening on the same interface.
|
||||
#threads: 16
|
||||
# set to no to disable promiscuous mode:
|
||||
#promisc: no
|
||||
# set snaplen, if not set it defaults to MTU if MTU can be known
|
||||
# via ioctl call and to full capture if not.
|
||||
#snaplen: 1518
|
||||
# Put default values here
|
||||
- interface: default
|
||||
#checksum-checks: auto
|
||||
|
||||
pcap-file:
|
||||
# Possible values are:
|
||||
@ -925,56 +762,6 @@ ipfw:
|
||||
# Set the default rule path here to search for the files.
|
||||
# if not set, it will look at the current working dir
|
||||
default-rule-path: /usr/local/etc/suricata/opnsense.rules
|
||||
rule-files:
|
||||
- botcc.rules
|
||||
- ciarmy.rules
|
||||
- compromised.rules
|
||||
- drop.rules
|
||||
- dshield.rules
|
||||
- emerging-activex.rules
|
||||
- emerging-attack_response.rules
|
||||
- emerging-chat.rules
|
||||
- emerging-current_events.rules
|
||||
- emerging-dns.rules
|
||||
- emerging-dos.rules
|
||||
- emerging-exploit.rules
|
||||
- emerging-ftp.rules
|
||||
- emerging-games.rules
|
||||
- emerging-icmp_info.rules
|
||||
# - emerging-icmp.rules
|
||||
- emerging-imap.rules
|
||||
- emerging-inappropriate.rules
|
||||
- emerging-malware.rules
|
||||
- emerging-misc.rules
|
||||
- emerging-mobile_malware.rules
|
||||
- emerging-netbios.rules
|
||||
- emerging-p2p.rules
|
||||
- emerging-policy.rules
|
||||
- emerging-pop3.rules
|
||||
- emerging-rpc.rules
|
||||
- emerging-scada.rules
|
||||
- emerging-scan.rules
|
||||
- emerging-shellcode.rules
|
||||
- emerging-smtp.rules
|
||||
- emerging-snmp.rules
|
||||
- emerging-sql.rules
|
||||
- emerging-telnet.rules
|
||||
- emerging-tftp.rules
|
||||
- emerging-trojan.rules
|
||||
- emerging-user_agents.rules
|
||||
- emerging-voip.rules
|
||||
- emerging-web_client.rules
|
||||
- emerging-web_server.rules
|
||||
- emerging-web_specific_apps.rules
|
||||
- emerging-worm.rules
|
||||
- tor.rules
|
||||
- decoder-events.rules # available in suricata sources under rules dir
|
||||
- stream-events.rules # available in suricata sources under rules dir
|
||||
- http-events.rules # available in suricata sources under rules dir
|
||||
- smtp-events.rules # available in suricata sources under rules dir
|
||||
- dns-events.rules # available in suricata sources under rules dir
|
||||
- tls-events.rules # available in suricata sources under rules dir
|
||||
|
||||
classification-file: /usr/local/etc/suricata/classification.config
|
||||
reference-config-file: /usr/local/etc/suricata/reference.config
|
||||
|
||||
@ -1320,7 +1107,5 @@ napatech:
|
||||
# The streams to listen on
|
||||
streams: [1, 2, 3]
|
||||
|
||||
# Includes. Files included here will be handled as if they were
|
||||
# inlined in this configuration file.
|
||||
#include: include1.yaml
|
||||
#include: include2.yaml
|
||||
# include installed rules list (generated by OPNsense install rules script)
|
||||
include: installed_rules.yaml
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user