Ok, i can remember exactly but if you do a cat on this file:

cat /usr/local/pf/var/alert

do you see something ?

Regards
Fabrice

Le 2015-02-19 09:47, Rosario Ippolito a écrit :
> Hello Fabrice,
> thanks for the quick response! I had already tried to see that file,
> sorry, but I can not open it. May I delete it and create a new one?
> (Maybe the file is corrupted)
>
>
>
>
> 2015-02-19 15:35 GMT+01:00 Fabrice DURAND <fdur...@inverse.ca
> <mailto:fdur...@inverse.ca>>:
>
>     Hello Rosario,
>
>     snort is suppose to send the alert in this file /usr/local/pf
>     /var/alert
>     , does it contain something ?
>
>     Regards
>     Fabrice
>
>     Le 2015-02-19 07:47, Rosario Ippolito a écrit :
>     > Hello everybody PacketFence's users,
>     > I have to ask some questions about Snort (Version 2.9.1.2) in
>     > PacketFence 4.6, deployed in out-of-band (Vlan Enforcement) mode. I
>     > have followed the Guide step by step, so:
>     >
>     > 1- I have enabled detection and select Snort as detection engine.
>     >
>     > 2- I have configured the eth1 interface in my PacketFence server in
>     > monitor type. This interface is connected to a cisco switch where
>     > PacketFence is also connected, and all traffic pass through this
>     switch.
>     >
>     > [interface eth1]
>     > type=monitor
>     >
>     > 3- I have loaded these rules in /usr/local/pf/conf/snort
>     >
>     > classification.config.example
>     > emerging-exploit.rules
>     > emerging-scan.rules
>     > emerging-worm.rules
>     > reference.config
>     > emerging-attack_response.rules
>     > emerging-malware.rules
>     > emerging-shellcode.rules
>     > local.rules
>     > reference.config.example
>     > classification.config
>     > emerging-botcc.rules
>     > emerging-p2p.rules
>     > emerging-trojan.rules
>     >  local.rules.example
>     >
>     > 4- I have this snort.conf file
>     >
>     > # Snort configuration
>     > # This file is manipulated on PacketFence's startup before being
>     given
>     > to snort
>     > var HOME_NET [%%trapping-range%%]
>     > var EXTERNAL_NET !$HOME_NET
>     > var DHCP_SERVERS [%%dhcp_servers%%]
>     > var DNS_SERVERS [%%dns_servers%%]
>     > var HTTP_PORTS 80
>     > var SSH_PORTS 22
>     > var ORACLE_PORTS 1521
>     > var SHELLCODE_PORTS any
>     > var HTTP_SERVERS $HOME_NET
>     > var SQL_SERVERS $HOME_NET
>     > var SMTP_SERVERS $HOME_NET
>     > var TELNET_SERVERS $HOME_NET
>     >
>     > var VALIDDHCP [$DHCP_SERVERS]
>     > var RULE_PATH %%install_dir%%/conf/snort
>     > output alert_fast: %%install_dir%%/var/alert
>     > # updated several preprocessor for snort 2.8.5 (values taken from
>     > /etc/snort/snort.conf)
>     > preprocessor stream5_global: max_tcp 8192, track_tcp yes, \
>     >                          track_udp no
>     > preprocessor stream5_tcp: policy first, use_static_footprint_sizes
>     > preprocessor http_inspect: global   iis_unicode_map
>     > /etc/snort/unicode.map 1252
>     > preprocessor http_inspect_server: server default \
>     >   profile all ports { 80 8080 8180 } oversize_dir_length 500
>     > #preprocessor conversation: timeout 120, max_conversations 65335
>     > #preprocessor portscan2: scanners_max 10000, targets_max 10000,
>     > target_limit 400, port_limit 400, timeout 60, log /dev/null
>     > #preprocessor portscan2-ignorehosts: $EXTERNAL_NET
>     > preprocessor perfmonitor: time 600 flow max file
>     > %%install_dir%%/logs/snortstat pktcnt 90000
>     > output alert_syslog: LOG_AUTH LOG_ALERT
>     >
>     > config flowbits_size: 256
>     > config disable_decode_alerts
>     > config disable_tcpopt_experimental_alerts
>     > config disable_tcpopt_obsolete_alerts
>     > config disable_tcpopt_ttcp_alerts
>     > config disable_ttcp_alerts
>     > config disable_tcpopt_alerts
>     > config disable_ipopt_alerts
>     >
>     > include $RULE_PATH/classification.config
>     > include $RULE_PATH/reference.config
>     > %%snort_rules%%
>     >
>     > 5- Snort starts with PacketFence and it works, so I try to
>     "snort" the
>     > traffic, with the "snort -i eth1" command, and, really, I see some
>     > traffic from the vlans that I have configured in my network. The
>     > problem is that even though I have configured the violation.conf
>     file
>     > to respond to alert snort.... snort does not give me any alert.
>     I have
>     > no log in pfdetect.log, is this normal?
>     >
>     >
>     > For test snort, I have added in local.rules the statement:
>     >
>     > "alert tcp any any <> any 80 (msg: "Test rule"; sid: 1000001;)"
>     >
>     > and I have just added in violations.conf file this other statement:
>     >
>     > [1000001]
>     > desc=Test web
>     > priority=10
>     > template=banned_devices
>     > enabled=Y
>     > actions=trap,log
>     > trigger=Detect::1000001
>     >
>     >
>     > But there is no raised alert from PacketFence..Should I enable all
>     > alert in the violations.conf file?
>     >
>     >
>     > Sorry for all these questions..I hope somebody can help me.
>     Thanks you
>     > very much in advance!!
>     >
>     >
>     > Best regards,
>     > Rosario Ippolito
>     >
>     >
>     >
>     >
>     
> ------------------------------------------------------------------------------
>     > Download BIRT iHub F-Type - The Free Enterprise-Grade BIRT Server
>     > from Actuate! Instantly Supercharge Your Business Reports and
>     Dashboards
>     > with Interactivity, Sharing, Native Excel Exports, App
>     Integration & more
>     > Get technology previously reserved for billion-dollar
>     corporations, FREE
>     >
>     
> http://pubads.g.doubleclick.net/gampad/clk?id=190641631&iu=/4140/ostg.clktrk
>     >
>     >
>     > _______________________________________________
>     > PacketFence-users mailing list
>     > PacketFence-users@lists.sourceforge.net
>     <mailto:PacketFence-users@lists.sourceforge.net>
>     > https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>
>     --
>     Fabrice Durand
>     fdur...@inverse.ca <mailto:fdur...@inverse.ca> ::  +1.514.447.4918
>     <tel:%2B1.514.447.4918> (x135) ::  www.inverse.ca
>     <http://www.inverse.ca>
>     Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and
>     PacketFence (http://packetfence.org)
>
>
>     
> ------------------------------------------------------------------------------
>     Download BIRT iHub F-Type - The Free Enterprise-Grade BIRT Server
>     from Actuate! Instantly Supercharge Your Business Reports and
>     Dashboards
>     with Interactivity, Sharing, Native Excel Exports, App Integration
>     & more
>     Get technology previously reserved for billion-dollar
>     corporations, FREE
>     
> http://pubads.g.doubleclick.net/gampad/clk?id=190641631&iu=/4140/ostg.clktrk
>     _______________________________________________
>     PacketFence-users mailing list
>     PacketFence-users@lists.sourceforge.net
>     <mailto:PacketFence-users@lists.sourceforge.net>
>     https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>
>
>
> ------------------------------------------------------------------------------
> Download BIRT iHub F-Type - The Free Enterprise-Grade BIRT Server
> from Actuate! Instantly Supercharge Your Business Reports and Dashboards
> with Interactivity, Sharing, Native Excel Exports, App Integration & more
> Get technology previously reserved for billion-dollar corporations, FREE
> http://pubads.g.doubleclick.net/gampad/clk?id=190641631&iu=/4140/ostg.clktrk
>
>
> _______________________________________________
> PacketFence-users mailing list
> PacketFence-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/packetfence-users


-- 
Fabrice Durand
fdur...@inverse.ca ::  +1.514.447.4918 (x135) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org) 

Attachment: 0xF78F957E.asc
Description: application/pgp-keys

------------------------------------------------------------------------------
Download BIRT iHub F-Type - The Free Enterprise-Grade BIRT Server
from Actuate! Instantly Supercharge Your Business Reports and Dashboards
with Interactivity, Sharing, Native Excel Exports, App Integration & more
Get technology previously reserved for billion-dollar corporations, FREE
http://pubads.g.doubleclick.net/gampad/clk?id=190641631&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to