1
0
Fork 0
mirror of https://github.com/pavel-odintsov/fastnetmon synced 2024-06-08 20:56:07 +02:00
fastnetmon-rewritten/src/fastnetmon.conf

120 lines
3.2 KiB
Plaintext
Raw Normal View History

2015-04-27 14:51:13 +02:00
###
### Main configuration params
###
# Enable/Disable any actions in case of attack
enable_ban = on
2015-04-27 14:51:13 +02:00
# We could disable processing for certain direction of traffic
process_incoming_traffic = on
process_outgoing_traffic = on
# How much packets we will collect from attack's traffic
ban_details_records_count = 500
# How long we should stay IP in blocked state
2015-04-27 18:01:13 +02:00
# If you set 0 here it completely disables unban capability
2014-12-03 16:03:47 +01:00
ban_time = 1900
2015-04-27 14:51:13 +02:00
# In this file you should list all your networks in CIDR format
networks_list_path = /etc/networks_list
# In this file you could list networks in CIDR format which will be not monitored for attacks
white_list_path = /etc/networks_whitelist
2015-04-27 14:51:13 +02:00
# How often we redraw client's screen
check_period = 1
# Connection tracking is very useful for attack detectiob because it provides huge amount of information
# But it's very CPU intensive and not recommended in big networks
enable_connection_tracking = off
# Different approaches to attack detection
ban_for_pps = on
ban_for_bandwidth = on
ban_for_flows = off
2015-04-27 14:51:13 +02:00
# Limits for Dos/DDoS attacks
threshold_pps = 20000
2014-10-29 10:33:11 +01:00
threshold_mbps = 1000
threshold_flows = 3500
2015-04-27 14:51:13 +02:00
###
### Traffic capture methods
###
# PF_RING traffic capture, enough fast but wire speed version need paid license
mirror = off
# Netmap traffic capture (very fast but need patched drivers)
mirror_netmap = off
# Pcap mode, very slow not suitable for production
pcap = off
# Netflow capture method with v5, v9 and IPFIX suppotr
2015-03-24 08:30:36 +01:00
netflow = on
2015-04-27 14:51:13 +02:00
# sFLOW capture suitable for switches
sflow = on
# PF_RING configuration
# If you have license for PF_RING ZC could could enable this mode and it could achieve wire speed for 10GE
enable_pf_ring_zc_mode = off
# Configuration for netmap, mirror, pcap modes
# For pcap and PF_RING we could specify "any"
# For netmap and PF_RING we could specify multiple interfaces separated by comma
interfaces = eth3,eth4
# We use average values for traffic speed to certain IP
average_calculation_time = 5
# Netflow configuration
netflow_port = 2055
netflow_host = 0.0.0.0
2015-04-27 14:51:13 +02:00
# For bind to all interfaces for all protocols: not possible now
# For bind to all interfaces for specific protocol: :: or 0.0.0.0
# For bind to localhost for specific protocol: ::1 or 127.0.0.1
# Netflow agents uses different and very complex approaches for notifying about sample ratio
# Here you could specify sampling ratio for all agents
netflow_sampling_ratio = 1
2015-04-27 14:51:13 +02:00
# sFLOW configuration
sflow_port = 6343
2015-03-24 08:30:36 +01:00
sflow_host = 0.0.0.0
2015-04-27 14:51:13 +02:00
###
### Actions when attack detected
###
# This script executed for ban, unban and atatck detailes collection
notify_script_path = /usr/local/bin/notify_about_attack.sh
# We could put attack details to Redis
redis_enabled = no
# Reddis configuration
redis_port = 6379
redis_host = 127.0.0.1
# ExaBGP could announce blocked IPs with BGP protocol
2015-04-26 11:47:37 +02:00
exabgp = off
exabgp_command_pipe = /var/run/exabgp.cmd
exabgp_community = 65001:666
exabgp_next_hop = 10.0.3.114
2015-04-27 14:51:13 +02:00
2015-05-10 20:42:49 +02:00
# Graphite monitoring
graphite = off
graphite_host = 127.0.0.1
graphite_port = 2003
2015-04-27 14:51:13 +02:00
###
### Client configuration
###
# Field used for sorting in client, could be: packets, bytes or flows
sort_parameter = packets
# How much IP's we will list for incoming and outgoing channel eaters
max_ips_in_list = 7