3 |
- |
1 |
# /etc/sysconfig/snort
|
|
|
2 |
# $Id$
|
|
|
3 |
|
|
|
4 |
# All of these options with the exception of -c, which tells Snort where
|
|
|
5 |
# the configuration file is, may be specified in that configuration file as
|
|
|
6 |
# well as the command line. Both the command line and config file options
|
|
|
7 |
# are listed here for reference.
|
|
|
8 |
|
|
|
9 |
|
|
|
10 |
#### General Configuration
|
|
|
11 |
|
|
|
12 |
# What interface should snort listen on? [Pick only 1 of the next 3!]
|
|
|
13 |
# This is -i {interface} on the command line
|
|
|
14 |
# This is the snort.conf config interface: {interface} directive
|
|
|
15 |
INTERFACE=eth1
|
|
|
16 |
#
|
|
|
17 |
# The following two options are not directly supported on the command line
|
|
|
18 |
# or in the conf file and assume the same Snort configuration for all
|
|
|
19 |
# instances
|
|
|
20 |
#
|
|
|
21 |
# To listen on all interfaces use this:
|
|
|
22 |
#INTERFACE=ALL
|
|
|
23 |
#
|
|
|
24 |
# To listen only on given interfaces use this:
|
|
|
25 |
#INTERFACE="eth1 eth2 eth3 eth4 eth5"
|
|
|
26 |
|
|
|
27 |
|
|
|
28 |
# Where is Snort's configuration file?
|
|
|
29 |
# -c {/path/to/snort.conf}
|
|
|
30 |
CONF=/etc/snort/snort.conf
|
|
|
31 |
|
|
|
32 |
# What user and group should Snort drop to after starting? This user and
|
|
|
33 |
# group should have very few privileges.
|
|
|
34 |
# -u {user} -g {group}
|
|
|
35 |
# config set_uid: user
|
|
|
36 |
# config set_gid: group
|
|
|
37 |
USER=snort
|
|
|
38 |
GROUP=snort
|
|
|
39 |
|
|
|
40 |
# Should Snort change the order in which the rules are applied to packets.
|
|
|
41 |
# Instead of being applied in the standard Alert->Pass->Log order, this will
|
|
|
42 |
# apply them in Pass->Alert->Log order.
|
|
|
43 |
# -o
|
|
|
44 |
# config order: {actions in order}
|
|
|
45 |
# e.g. config order: log alert pass activation dynamic suspicious redalert
|
|
|
46 |
PASS_FIRST=0
|
|
|
47 |
|
|
|
48 |
|
|
|
49 |
#### Logging & Alerting
|
|
|
50 |
|
|
|
51 |
# NOTE: NO_PACKET_LOG and BINARY_LOG, ALERTMODE, etc. are mutually
|
|
|
52 |
# exclusive. Use either NO_PACKET_LOG or any/all of the other logging
|
|
|
53 |
# options. But the more logging options use you, the slower Snort will run.
|
|
|
54 |
|
|
|
55 |
|
|
|
56 |
# Where should Snort log?
|
|
|
57 |
# -l {/path/to/logdir}
|
|
|
58 |
# config logdir: {/path/to/logdir}
|
|
|
59 |
LOGDIR=/var/log/snort
|
|
|
60 |
|
|
|
61 |
# How should Snort alert? Valid alert modes include fast, full, none, and
|
|
|
62 |
# unsock. Fast writes alerts to the default "alert" file in a single-line,
|
|
|
63 |
# syslog style alert message. Full writes the alert to the "alert" file
|
|
|
64 |
# with the full decoded header as well as the alert message. None turns off
|
|
|
65 |
# alerting. Unsock is an experimental mode that sends the alert information
|
|
|
66 |
# out over a UNIX socket to another process that attaches to that socket.
|
|
|
67 |
# -A {alert-mode}
|
|
|
68 |
# output alert_{type}: {options}
|
|
|
69 |
#ALERTMODE=fast
|
|
|
70 |
|
|
|
71 |
# Should Snort dump the application layer data when displaying packets in
|
|
|
72 |
# verbose or packet logging mode.
|
|
|
73 |
# -d
|
|
|
74 |
# config dump_payload
|
|
|
75 |
DUMP_APP=0
|
|
|
76 |
|
|
|
77 |
# Should Snort keep binary (AKA pcap, AKA tcpdump) logs also? This is
|
|
|
78 |
# recommended as it provides very useful information for investigations.
|
|
|
79 |
# -b
|
|
|
80 |
# output log_tcpdump: {log name}
|
|
|
81 |
BINARY_LOG=0
|
|
|
82 |
|
|
|
83 |
# Should Snort turn off packet logging? The program still generates
|
|
|
84 |
# alerts normally.
|
|
|
85 |
# -N
|
|
|
86 |
# config nolog
|
|
|
87 |
NO_PACKET_LOG=0
|
|
|
88 |
|
|
|
89 |
# Print out the receiving interface name in alerts.
|
|
|
90 |
# -I
|
|
|
91 |
# config alert_with_interface_name
|
|
|
92 |
PRINT_INTERFACE=0
|
|
|
93 |
|
|
|
94 |
# When dumping the stats, what log file should we look in
|
|
|
95 |
SYSLOG=/var/log/messages
|
|
|
96 |
|
|
|
97 |
# When dumping the stats, how long to wait to make sure that syslog can
|
|
|
98 |
# flush data to disk
|
|
|
99 |
SECS=5
|
|
|
100 |
|
|
|
101 |
# To add a BPF filter to the command line uncomment the following variable
|
|
|
102 |
# syntax corresponds to tcpdump(8)
|
|
|
103 |
#BPF="not host 192.168.1.1"
|
|
|
104 |
|
|
|
105 |
# To use an external BPF filter file uncomment the following variable
|
|
|
106 |
# syntax corresponds to tcpdump(8)
|
|
|
107 |
# -F {/path/to/bpf_file}
|
|
|
108 |
# config bpf_file: /path/to/bpf_file
|
|
|
109 |
#BPFFILE=/etc/snort/bpf_file
|
|
|
110 |
|