亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? snort.conf

?? 網(wǎng)絡(luò)安全入侵檢測(cè)系統(tǒng)原碼
?? CONF
字號(hào):
# $Id: snort.conf,v 1.14 2001/01/05 19:27:33 roesch Exp $ ##################################################################### This file contains a sample snort configuration. You can take the # following steps to create your own custom configuration:##  1) Set the HOME_NET variable for your network#  2) Configure preprocessors#  3) Configure output plugins #  4) Customize your rule set###################################################################### Step #1: Set the HOME_NET variable:##    You must change the HOME_NET variable to reflect your local#    network. The variable is currently setup for an RFC 1918 address#    space.##    You can specify it explicitly as: var HOME_NET 10.1.1.0/24#    or use global variable $<intname>_ADDRESS which will be always #    initialized to IP address and netmask of the network interface #    which you run snort at.##    You can specify lists of IP addresses by separating the IPs with commas #    like this:##    [10.1.1.0/24,192.168.1.0/24]##    MAKE SURE YOU DON'T PLACE ANY SPACES IN YOUR LIST!###var HOME_NET $eth0_ADDRESSvar HOME_NET 10.1.1.0/24# Set up the external network addresses as well.  A good start may be # "any"...var EXTERNAL_NET any# Define the addresses of DNS servers and other hosts if you want to ignore # portscan false alarms from them...#var DNS_SERVERS [192.168.1.1/32,10.1.1.1/32]##################################################################### Step #2: Configure preprocessors## General configuration for preprocessors is of the form# #   preprocessor <name_of_processor>: <configuration_options># minfrag: detect small fragments# -------------------------------# minfrag takes the minimum fragment size (in bytes) threshold as its# argument. Fragmented packets at of below this size will cause an# alert to be generated.  The functionality of this preprocessor is # largely superceded by the defrag plugin below.#preprocessor minfrag: 128# defrag: defragmentation support# -------------------------------# IP defragmentation support from Dragos Ruiu. There are no# configuration options at this time.preprocessor defrag# stream: TCP stream reassembly# -----------------------------# TCP stream reassembly preprocessor from Chris Cramer.  This# preprocessor should always go after the defrag preprocessor, but# before http_decode. The example below monitors ports 23 and 80, has# a timeout after 10 seconds, and will send reassembled packets of max# payload 16384 bytes through the detection engine. See# README.tcpstream for more information and configuration# options. Uncomment the following line and configure appropriately to# enable this preprocessor.## NOTE: This code should still be considered BETA!  It seems to be stable, but# there are still some issues that remain to be resolved, so make sure# you keep an eye on your Snort sensor if you enable this plugin# preprocessor stream: timeout 10, ports 21 23 80, maxbytes 16384# http_decode: normalize HTTP requests# ------------------------------------# http_decode normalizes HTTP requests from remote machines by# converting any %XX character substitutions to their ASCII# equivalent. This is very useful for doing things like defeating# hostile attackers trying to stealth themselves from IDSs by mixing# these substitutions in with the request. Specify the port# numbers you want it to analyze as arguments.preprocessor http_decode: 80 8080# portscan: detect a variety of portscans# ---------------------------------------# portscan preprocessor by Patrick Mullen <p_mullen@linuxrc.net># This preprocessor detects UDP packets or TCP SYN packets going to# four different ports in less than three seconds. "Stealth" TCP# packets are always detected, regardless of these settings.preprocessor portscan: $HOME_NET 4 3 portscan.log# Use portscan-ignorehosts to ignore TCP SYN and UDP "scans" from # specific networks or hosts to reduce false alerts. It is typical# to see many false alerts from DNS servers so you may want to # add your DNS servers here. You can all multiple hosts/networks# in a whitespace-delimited list. ##preprocessor portscan-ignorehosts: $DNS_SERVERS# Spade: the Statistical Packet Anomaly Detection Engine#-------------------------------------------------------## READ the README.Spade file before using this plugin!## See http://www.silicondefense.com/spice/ for more info## Spade is a Snort plugin to report unusual, possibly suspicious, packets.  # Spade will review the packets received by Snort, find those of interest (TCP# SYNs into your homenets, if any), and report those packets that it believes # are anomalous along with an anomaly score.  To enable spp_anomsensor, you # must have a line of this form in your snort configuration file:## preprocessor spade: <anom-report-thresh> <state-file> <log-file> <prob-mode>#                     <checkpoint-freq>## DO NOT ENABLE THIS PLUGIN UNLESS YOU HAVE READ THE README.Spade FILE THAT# COMES IN THIS DISTRIBUTION AND ARE COGENT OF THE PERFORMANCE IMPACT THAT THIS# MODULE MAY HAVE UPON YOUR NORMAL SNORT CONFIGURATION!## set this to a directory Spade can read and write to store its files## var SPADEDIR .## preprocessor spade: -1 $SPADEDIR/spade.rcv $SPADEDIR/log.txt 3 50000## put a list of the networks you are interested in Spade observing packets # going to here## preprocessor spade-homenet: 0.0.0.0/0## this causes Spade to adjust the reporting threshold automatically# the first argument is the target rate of alerts for normal circumstances # (0.01 = 1% or you can give it an hourly rate) after the first hour (or # however long the period is set to in the second argument), the reporting # threshold given above is ignored you can comment this out to have the# threshold be static, or try one of the other adapt methods below## preprocessor spade-adapt3: 0.01 60 168## other possible Spade config lines:# adapt method #1#preprocessor spade-adapt: 20 2 0.5# adapt method #2#preprocessor spade-adapt2: 0.01 15 4 24 7# offline threshold learning#preprocessor spade-threshlearn: 200 24# periodically report on the anom scores and count of packets seen#preprocessor spade-survey:  $SPADEDIR/survey.txt 60# print out known stats about packet feature#preprocessor spade-stats: entropy uncondprob condprob##################################################################### Step #3: Configure output plugins## Uncomment and configure the output plugins you decide to use.# General configuration for output plugins is of the form:# # output <name_of_plugin>: <configuration_options>## Note that you can optionally define new rule types and associate one# or more output plugins specifically to that type.## This example will create a type that will log to just tcpdump.# ruletype suspicious# {#   type log#   output log_tcpdump: suspicious.log# }## This example will create a rule type that will log to syslog # and a mysql database.# ruletype redalert# {#   type alert#   output alert_syslog: LOG_AUTH LOG_ALERT#   output database: log, mysql, user=snort dbname=snort host=localhost# }# alert_syslog: log alerts to syslog# ----------------------------------# Use one or more syslog facilities as arguments## output alert_syslog: LOG_AUTH LOG_ALERT# log_tcpdump: log packets in binary tcpdump format# -------------------------------------------------# The only argument is the output file name.## output log_tcpdump: snort.log# database: log to a variety of databases# ---------------------------------------# See the README.database file for more information about configuring# and using this plugin.## output database: log, mysql, user=snort dbname=snort host=localhost# output database: log, postgresql, user=snort dbname=snort # output database: log, unixodbc, user=snort dbname=snort# xml: xml logging# ----------------# See the README.xml file for more information about configuring# and using this plugin.# # output xml: log, file=/var/log/snortxml##################################################################### Step #4: Customize your rule set## Up to date snort rules are available at the following web sites:#   http://www.snort.org#   http://www.whitehats.com## The snort web site has documentation about how to write your own# custom snort rules. ## The rules included with this distribution generate alerts based on# on suspicious activity. Depending on your network environment, your# security policies, and what you consider to be suspicious, some of# these rules may either generate false positives ore may be detecting# activity you consider to be acceptable; therefore, you are# encouraged to comment out rules that are not applicable in your# environment.## Note that using all of the rules at the same time may lead to# serious packet loss on slower machines. YMMV, use with caution,# standard disclaimers apply. :)## The following individuals contributed many of rules in this# distribution.## Credits:#   Ron Gula <rgula@securitywizards.com> of Network Security Wizards#   Martin Markgraf <martin@mail.du.gtn.com>  #   CyberPsychotic <fygrave@tigerteam.net>#   Nick Rogness <nick@rapidnet.com>#   Jim Forster <jforster@rapidnet.com>#   Scott McIntyre <scott@whoi.edu>#   Tom Vandepoel <Tom.Vandepoel@ubizen.com>include webcgi-libinclude webcf-libinclude webiis-libinclude webfp-libinclude webmisc-libinclude overflow-libinclude finger-libinclude ftp-libinclude smtp-libinclude telnet-libinclude misc-libinclude netbios-libinclude scan-libinclude ddos-libinclude backdoor-libinclude ping-libinclude rpc-lib

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美一区二区三区播放老司机| 在线电影院国产精品| 国产麻豆一精品一av一免费| 午夜激情一区二区三区| 艳妇臀荡乳欲伦亚洲一区| 一区二区三区四区激情| 亚洲天堂精品视频| 成人欧美一区二区三区视频网页 | 爽好多水快深点欧美视频| 一区二区在线观看免费视频播放| 亚洲国产精品激情在线观看| 国产农村妇女毛片精品久久麻豆 | 亚洲男女一区二区三区| 国产精品蜜臀在线观看| 亚洲色图一区二区三区| 亚洲天堂中文字幕| 亚洲综合999| 亚洲成人午夜电影| 日韩精品一二三| 免费成人在线观看| 国内精品久久久久影院一蜜桃| 看电影不卡的网站| 国产一区二区h| 国产1区2区3区精品美女| 丁香另类激情小说| 91在线观看免费视频| 色狠狠色噜噜噜综合网| 欧美精品一二三四| 日韩欧美久久一区| 国产午夜精品一区二区三区视频 | 91麻豆精品国产自产在线| 制服丝袜亚洲精品中文字幕| 日韩视频免费观看高清完整版| 精品精品国产高清一毛片一天堂| 久久久久久麻豆| 亚洲欧洲精品一区二区三区| 亚洲一区免费观看| 麻豆精品视频在线观看视频| 国产精品自在在线| 97精品久久久久中文字幕 | 亚洲日本免费电影| 视频一区中文字幕国产| 韩国精品免费视频| 91亚洲永久精品| 欧美一区二区三区在线视频| 国产欧美日韩一区二区三区在线观看| 亚洲黄色免费网站| 蜜桃久久久久久久| 99这里只有久久精品视频| 91网站在线观看视频| 制服丝袜日韩国产| 国产精品电影一区二区三区| 五月婷婷综合在线| 成人在线综合网| 91精品国产免费久久综合| 国产精品系列在线| 青青草精品视频| 99精品久久久久久| 日韩精品综合一本久道在线视频| 国产网站一区二区| 午夜精品免费在线| 成人a级免费电影| 日韩精品一区二区三区蜜臀| 日韩美女精品在线| 麻豆成人免费电影| 色欧美乱欧美15图片| 久久蜜桃av一区精品变态类天堂 | 亚洲午夜久久久| 国产精品一区二区三区网站| 欧美色精品天天在线观看视频| 欧美激情综合网| 久久精品国产秦先生| 在线日韩av片| 国产精品福利电影一区二区三区四区| 日韩二区三区四区| 欧美午夜电影在线播放| 国产精品人人做人人爽人人添| 裸体在线国模精品偷拍| 欧美专区亚洲专区| 亚洲欧洲日韩综合一区二区| 国产乱人伦偷精品视频免下载 | 久久人人爽爽爽人久久久| 亚洲国产精品久久久久秋霞影院| 北条麻妃国产九九精品视频| 欧美精品一区二区高清在线观看| 亚洲一二三四久久| 91免费看片在线观看| 国产日产欧美一区| 国产在线一区二区综合免费视频| 欧美日韩国产123区| 亚洲精品久久久蜜桃| 波多野结衣中文字幕一区| 精品国产精品网麻豆系列| 日本在线不卡视频| 欧美日韩视频在线一区二区| 亚洲人亚洲人成电影网站色| 成人高清视频在线| 国产欧美一区二区在线| 国产美女一区二区| www国产精品av| 韩国av一区二区| 精品国产91乱码一区二区三区| 美女视频一区在线观看| 欧美精品久久99| 天堂精品中文字幕在线| 欧美三级欧美一级| 五月天中文字幕一区二区| 欧美欧美欧美欧美首页| 性做久久久久久免费观看 | 天涯成人国产亚洲精品一区av| 日本高清成人免费播放| 亚洲精品视频在线看| 99国产精品99久久久久久| 国产精品白丝在线| 91国模大尺度私拍在线视频| 夜夜爽夜夜爽精品视频| 欧美精品高清视频| 乱中年女人伦av一区二区| 精品久久久久久久久久久院品网| 国产呦萝稀缺另类资源| 国产人成一区二区三区影院| 成人激情动漫在线观看| 亚洲丝袜精品丝袜在线| 精品视频一区三区九区| 蜜桃久久久久久| 欧美国产综合色视频| 91视频观看视频| 亚洲观看高清完整版在线观看| 在线不卡中文字幕播放| 精品一区二区久久久| 国产性色一区二区| 91黄色在线观看| 免费在线观看一区| 久久久久久久久久久久久久久99| 亚洲精品国产a久久久久久| 国产91精品久久久久久久网曝门 | 日韩av在线发布| 久久婷婷成人综合色| 亚洲色欲色欲www| 国产亚洲综合色| 日韩一区二区三区四区五区六区| 国产麻豆精品在线| 韩国在线一区二区| 亚洲国产三级在线| 欧美吻胸吃奶大尺度电影| 欧美aaaaaa午夜精品| 日韩视频免费观看高清完整版在线观看| 国产综合色产在线精品| 综合久久久久久久| 欧美日韩精品是欧美日韩精品| 国产精品99久久久久久久女警| 国产视频一区二区三区在线观看| 色老头久久综合| 免费观看成人鲁鲁鲁鲁鲁视频| 国产精品污污网站在线观看| 懂色av中文一区二区三区| 亚洲精品高清在线| 精品国产人成亚洲区| 99视频精品在线| 另类小说色综合网站| 国产精品成人一区二区艾草| 在线成人高清不卡| 亚洲国产日日夜夜| 国产精品国产三级国产aⅴ中文| 91精品婷婷国产综合久久竹菊| 国产综合色产在线精品| 亚洲韩国精品一区| 久久久久久久久久电影| 欧美日韩你懂的| 久久99久久久欧美国产| 夜夜夜精品看看| 国产欧美日韩在线| 欧美日韩精品欧美日韩精品一| 成人精品视频一区二区三区尤物| 亚洲一级二级在线| 成人免费视频在线观看| 欧美精品久久久久久久多人混战 | 91麻豆精品视频| 免费在线成人网| 综合在线观看色| 久久久久久免费| 欧美日韩国产bt| 91福利资源站| 不卡区在线中文字幕| 久久精品国产免费看久久精品| 亚洲香肠在线观看| 国产欧美一区视频| 久久麻豆一区二区| 欧美日韩在线播放三区四区| 成人高清视频在线观看| 国产不卡视频一区二区三区| 视频一区二区欧美| 亚洲成人黄色影院| 久久久久久久久久久久久夜| 欧美大片日本大片免费观看| 欧美一区二区三区公司| 在线欧美日韩精品| 99精品视频一区二区三区| 秋霞av亚洲一区二区三| 亚洲电影一区二区三区|