-
Notifications
You must be signed in to change notification settings - Fork 521
Snort
Please note! This wiki is no longer maintained. Our documentation has moved to https://securityonion.net/docs/. Please update your bookmarks. You can find the latest version of this page at: https://securityonion.net/docs/Snort.
Snort is a Network Intrusion Detection System (NIDS). It sniffs network traffic and generates IDS alerts.
In Security Onion, we compile Snort with PF_RING to allow you to spin up multiple instances to handle more traffic.
You can configure Snort via snort.conf:
/etc/nsm/HOSTNAME-INTERFACE/snort.conf
(where HOSTNAME is your actual hostname and INTERFACE is your actual sniffing interface)
If you would like to configure/manage IDS rules, please see:
https://github.com/Security-Onion-Solutions/security-onion/wiki/Rules
https://github.com/Security-Onion-Solutions/security-onion/wiki/ManagingAlerts
If you need to troubleshoot Snort, check the Snort log file:
/var/log/nsm/HOSTNAME-INTERFACE/snortu-X.log
(where HOSTNAME is your actual hostname, INTERFACE is your actual sniffing interface, and X represents the number of PF_RING instances)
For more information about Snort, please see:
http://snort.org
- Introduction
- Use Cases
- Hardware Requirements
- Release Notes
- Download/Install
- Booting Issues
- After Installation
- UTC and Time Zones
- Services
- VirtualBox Walkthrough
- VMWare Walkthrough
- Videos
- Architecture
- Cheat Sheet
- Conference
- Elastic Stack
- Elastic Architecture
- Elasticsearch
- Logstash
- Kibana
- ElastAlert
- Curator
- FreqServer
- DomainStats
- Docker
- Redis
- Data Fields
- Beats
- Pre-Releases
- ELSA to Elastic
- Network Configuration
- Proxy Configuration
- Firewall/Hardening
- Email Configuration
- Integrating with other systems
- Changing IP Addresses
- NTP
- Managing Alerts
- Managing Rules
- Adding Local Rules
- Disabling Processes
- Filtering with BPF
- Adjusting PF_RING for traffic
- MySQL Tuning
- Adding a new disk
- High Performance Tuning
- Trimming PCAPs