Ola Pessoal da lista!
Tenho um servidor CL 7.0 o qual utiliza ADSL BrasilTelecom.....Uso a
eth0 para conectar com o MODEM ADSL e a eth1 para rede interna. Qdo o ADSL
se conecta ele levanta a interface ppp0 pela qual recebe um IP valido para
eu trafegar na internet.
Qdo eu utilizo o mascaramento (iptables ou ipchains) devo colocar
a interface a ser mascarada sempre a ppp0, pois a eth0, nao responde a isso.
Entao pensei o mesmo sobre o Snort...ele pede nos arquivos de configuracao
para eu colocar a interface a ser "escutada".. coloquei a eth0 e nada,
tentei a ppp0 e nada....em ambos nao reporta erro mas tbem..testo um ataque
(nmap remoto) ele nao reporta nada na base de dados...
Vou colocar ae os 2 arquivos de configuracao....
[root@Router /root]# cat /etc/snort/snort.conf
# $Id: snort.conf,v 1.13 2001/01/02 21:42:11 roesch Exp $
####################################################################
# This file contains a sample snort configuration. You can take the
# following steps to create your own custom configuration:
#
# 1) Set the HOME_NET variable for your network
# 2) Configure preprocessors
# 3) Configure output plugins
# 4) Customize your rule set
#
####################################################################
# Step #1: Set the HOME_NET variable:
#
# You must change the HOME_NET variable to reflect your local
# network. The variable is currently setup for an RFC 1918 address
# space.
#
# You can specify it explicitly as: var HOME_NET 10.1.1.0/24
# or use global variable $<intname>_ADDRESS which will be always
# initialized to IP address and netmask of the network interface
# which you run snort at.
#
# You can specify lists of IP addresses by separating the IPs with commas
# like this:
#
# [10.1.1.0/24,192.168.1.0/24]
#
# MAKE SURE YOU DON'T PLACE ANY SPACES IN YOUR LIST!
#
#
#var HOME_NET $eth0_ADDRESS
var HOME_NET $eth1_ADDRESS
# Set up the external network addresses as well. A good start may be
# "any"...
var EXTERNAL_NET any
# Define the addresses of DNS servers and other hosts if you want to ignore
# portscan false alarms from them...
var DNS_SERVERS [200.180.128.68/32,200.215.1.35/32]
........
Aqui eu coloquei a interface a ser escutada ou seja a ppp0
[root@Router /root]# cat /etc/sysconfig/snort
# system wide configuration file for the snort daemon
# put here the interface you whish snort to monitor
# please note that the startup script
# will also modify /etc/snort/snort.conf to reflect this
# Note: this interface better be up before starting snort!
INTERFACE=ppp0
# set ACTIVATE to 'yes' if you want snort to be run everytime
# the INTERFACE goes up. If you really want to use snort, you
# should set this to 'yes'.
# the init script can also be used to toggle this setting
ACTIVATE=no
# setting AUTO to 'yes' will have the startup script change the
# HOME_NET variable in /etc/snort/snort.conf to the INTERFACE's
# address everytime snort is started via the init script
# i.e., it will change the line
# var HOME_NET blabla
# to
# var HOME_NET $eth0_ADDRESS
# if INTERFACE were set to eth0
# If you want more control over snort's behaviour, set this to 'no'
AUTO=no
# 'yes' will put the interface in promiscuous mode, anything
# else will disable this
PROMISC=no
# extra parameters. These are inserted at the end of snort's command
# line. Please do not repeat options already used, check the startup
# script if in doubt
EXTRA_OPTIONS=
.......
Caso alguem ja tenha utilizado o Snort em ADSL....favor algumas dicas
Ricardo Manica Pereira
Consultoria e Implementa��o de Redes
(Linux, Windows 9x, Windows 2000
Windows 2000 Server , NT Server)
55-99713795
[EMAIL PROTECTED]
_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp
Assinantes em 04/10/2001: 2358
Mensagens recebidas desde 07/01/1999: 135320
Historico e [des]cadastramento: http://linux-br.conectiva.com.br
Assuntos administrativos e problemas com a lista:
mailto:[EMAIL PROTECTED]