[Oisf-users] Configure IPS and NSM in Suricata.

Kaushal Shriyan kaushalshriyan at gmail.com
Sun Mar 31 01:56:14 UTC 2019


On Sat, Mar 30, 2019 at 9:14 PM Kaushal Shriyan <kaushalshriyan at gmail.com>
wrote:

> Hi,
>
> I am running Suricata 4.1.3 on CentOS Linux release 7.6.1810 (Core) and
> have configured Suricata in IDS mode. I will appreciate if you can help me
> to configure IPS and NSM in Suricata.
>
> Thanks in advance and i look forward to hearing from you.
>
> Best Regards,
>
> Kaushal
>


Hi,

I have the below settings for Suricata

# suricata --build-info
> This is Suricata version 4.1.3 RELEASE
> Features: NFQ PCAP_SET_BUFF AF_PACKET HAVE_PACKET_FANOUT LIBCAP_NG
> LIBNET1.1 HAVE_HTP_URI_NORMALIZE_HOOK PCRE_JIT HAVE_NSS HAVE_LUA
> HAVE_LIBJANSSON TLS MAGIC RUST
> SIMD support: none
> Atomic intrisics: 1 2 4 8 byte(s)
> 64-bits, Little-endian architecture
> GCC version 4.8.5 20150623 (Red Hat 4.8.5-36), C version 199901
> compiled with _FORTIFY_SOURCE=2
> L1 cache line size (CLS)=64
> thread local storage method: __thread
> compiled with LibHTP v0.5.30, linked against LibHTP v0.5.30
> Suricata Configuration:
>   AF_PACKET support:                       yes
>   eBPF support:                            no
>   XDP support:                             no
>   PF_RING support:                         no
>   NFQueue support:                         yes
>   NFLOG support:                           no
>   IPFW support:                            no
>   Netmap support:                          no
>   DAG enabled:                             no
>   Napatech enabled:                        no
>   WinDivert enabled:                       no
>   Unix socket enabled:                     yes
>   Detection enabled:                       yes
>   Libmagic support:                        yes
>   libnss support:                          yes
>   libnspr support:                         yes
>   libjansson support:                      yes
>   liblzma support:                         no
>   hiredis support:                         yes
>   hiredis async with libevent:             yes
>   Prelude support:                         yes
>   PCRE jit:                                yes
>   LUA support:                             yes
>   libluajit:                               no
>   libgeoip:                                yes
>   Non-bundled htp:                         no
>   Old barnyard2 support:                   no
>   Hyperscan support:                       yes
>   Libnet support:                          yes
>   liblz4 support:                          yes
>   Rust support:                            yes (default)
>   Rust strict mode:                        no
>   Rust debug mode:                         no
>   Rust compiler:                           rustc 1.32.0
>   Rust cargo:                              cargo 1.32.0
>   Install suricatasc:                      yes
>   Install suricata-update:                 yes
>   Profiling enabled:                       no
>   Profiling locks enabled:                 no
> Development settings:
>   Coccinelle / spatch:                     no
>   Unit tests enabled:                      no
>   Debug output enabled:                    no
>   Debug validation enabled:                no
> Generic build parameters:
>   Installation prefix:                     /usr
>   Configuration directory:                 /etc/suricata/
>   Log directory:                           /var/log/suricata/
>   --prefix                                 /usr
>   --sysconfdir                             /etc
>   --localstatedir                          /var
>   --datarootdir                            /usr/share
>   Host:                                    x86_64-redhat-linux-gnu
>   Compiler:                                gcc -std=gnu99 (exec name) /
> gcc (real)
>   GCC Protect enabled:                     yes
>   GCC march native enabled:                no
>   GCC Profile enabled:                     no
>   Position Independent Executable enabled: yes
>   CFLAGS                                   -O2 -g -pipe -Wall
> -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong
> --param=ssp-buffer-size=4 -grecord-gcc-switches   -m64 -mtune=generic
> -I${srcdir}/../rust/gen/c-headers
>   PCAP_CFLAGS
>   SECCFLAGS                                -fstack-protector
> -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security
> #


Please comment.

Best Regards,

Kaushal
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openinfosecfoundation.org/pipermail/oisf-users/attachments/20190331/25d18193/attachment.html>


More information about the Oisf-users mailing list