Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
O
OpnSense
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Kulya
OpnSense
Commits
af2451c2
Commit
af2451c2
authored
Nov 18, 2015
by
Ad Schellevis
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
(IDS) add netmap IPS to suricata base template
parent
626bbd88
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
36 additions
and
2 deletions
+36
-2
suricata.yaml
src/opnsense/service/templates/OPNsense/IDS/suricata.yaml
+36
-2
No files found.
src/opnsense/service/templates/OPNsense/IDS/suricata.yaml
View file @
af2451c2
...
...
@@ -18,7 +18,7 @@
# Runmode the engine should use. Please check --list-runmodes to get the available
# runmodes for each packet acquisition method. Defaults to "autofp" (auto flow pinned
# load balancing).
#runmode: autofp
runmode
:
workers
# Specifies the kind of flow load balancer used by the flow pinned autofp mode.
#
...
...
@@ -37,7 +37,7 @@
# If set to auto, the variable is internally switch to 'router' in IPS mode
# and 'sniffer-only' in IDS mode.
# This feature is currently only used by the reject* keywords.
host-mode
:
sniffer-only
#
host-mode: sniffer-only
# Run suricata as user and group.
#run-as:
...
...
@@ -307,6 +307,22 @@ nflog:
# netlink max buffer size
max-size
:
20000
netmap
:
-
interface
:
default
threads
:
auto
copy-mode
:
ips
disable-promisc
:
no
checksum-checks
:
auto
{
%
for intfName in OPNsense.IDS.general.interfaces.split('
,
'
)
%}
-
interface:
{{helpers.getNodeByTag('
interfaces.'+intfName).if
}
}
copy-iface
:
{{
helpers.getNodeByTag('interfaces.'+intfName).if
}}
+
-
interface
:
{{
helpers.getNodeByTag('interfaces.'+intfName).if
}}
+
copy-iface
:
{{
helpers.getNodeByTag('interfaces.'+intfName).if
}}
{
%
endfor %
}
legacy
:
uricontent
:
enabled
...
...
@@ -902,6 +918,24 @@ app-layer:
enabled
:
yes
detection-ports
:
dp
:
139
# Note: Modbus probe parser is minimalist due to the poor significant field
# Only Modbus message length (greater than Modbus header length)
# And Protocol ID (equal to 0) are checked in probing parser
# It is important to enable detection port and define Modbus port
# to avoid false positive
modbus
:
# How many unreplied Modbus requests are considered a flood.
# If the limit is reached, app-layer-event:modbus.flooded; will match.
#request-flood: 500
enabled
:
yes
detection-ports
:
dp
:
502
# According to MODBUS Messaging on TCP/IP Implementation Guide V1.0b, it
# is recommended to keep the TCP connection opened with a remote device
# and not to open and close it for each MODBUS/TCP transaction. In that
# case, it is important to set the depth of the stream reassembling as
# unlimited (stream.reassembly.depth: 0)
# smb2 detection is disabled internally inside the engine.
#smb2:
# enabled: yes
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment