⑥ 跳到 114 行, 找到 var RULE_PATH 字段 , 并在其后面填上完整的 snort 规则存放路径 , 这
里为 /etc/snort/rules.
⑦ 跳到第 476 行, iis_unicode_map 字段 , 在其后面写上 /etc/snort/rules/unicode.map
1252
⑧ 跳到第 905 行, 找到 include classification.config 项, 将其改为 : include
/etc/snort/rules/classification.config
⑨ 跳到第 913 行, 找到 include reference.config 项 , 将其改为 include
/etc/snort/rules/reference.config
⑩ 将 /usr/local/bin/snort -d -D -h 10.10.0.0/24 -c /etc/snort.conf 添加到
/etc/rc.d/rc.local 文件中 .
注意 : 在此处的 -h 后面应该填上要监控的网段 , 这一部的意思是开机自动启动 NIDS 入侵检
测系统 .
? /etc/snort/rules 跳到第 953 行, 找到 include $RULE_PATH/bad-traffic.rules . 从这
行开始一直到最后 , 全部为 snort 的规则集合 , 可根据个人需要进行调试 . 以 # 号为准表示
是否启用 .
? 建议去掉这些规则前面的 # 号 , 即放开这些规则 .
# include $RULE_PATH/web-attacks.rules
# include $RULE_PATH/backdoor.rules
# include $RULE_PATH/shellcode.rules
# include $RULE_PATH/policy.rules
# include $RULE_PATH/porn.rules
# include $RULE_PATH/info.rules
# include $RULE_PATH/icmp-info.rules
# include $RULE_PATH/virus.rules
# include $RULE_PATH/chat.rules
# include $RULE_PATH/multimedia.rules
# include $RULE_PATH/p2p.rules
# include $RULE_PATH/spyware-put.rules
配置 guardian:
① 解包 , 跳转到解压出来的目录 , 依次执行以下几条复制命令 .
② echo > /etc/guardian.ignore
③ cp guardian.pl /usr/local/bin/
④ cp scripts/iptables_block.sh /usr/local/bin/guardian_block.sh
⑤ cp scripts/iptables_unblock.sh /usr/local/bin/guardian_unblock.sh
⑥ cp guardian.conf /etc/
评论0
最新资源