mirror of https://github.com/OISF/suricata
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
47 lines
1.3 KiB
ReStructuredText
47 lines
1.3 KiB
ReStructuredText
9 years ago
|
Ignoring Traffic
|
||
|
================
|
||
|
|
||
|
In some cases there are reasons to ignore certain traffic. Maybe a
|
||
|
trusted host or network, or a site. This document lists some
|
||
|
strategies for ignoring traffic.
|
||
|
|
||
|
capture filters (BPF)
|
||
|
---------------------
|
||
|
|
||
|
Through BPFs the capture methods pcap, af-packet and pf_ring can be
|
||
|
told what to send to Suricata, and what not. For example a simple
|
||
|
filter 'tcp' will only send tcp packets.
|
||
|
|
||
|
If some hosts and or nets need to be ignored, use something like "not
|
||
|
(host IP1 or IP2 or IP3 or net NET/24)".
|
||
|
|
||
|
pass rules
|
||
|
----------
|
||
|
|
||
|
Pass rules are Suricata rules that if matching, pass the packet and in
|
||
|
case of TCP the rest of the flow. They look like normal rules, except
|
||
|
that instead of 'alert' or 'drop' they start with 'pass'.
|
||
|
|
||
|
Example:
|
||
|
|
||
|
::
|
||
|
|
||
|
pass ip 1.2.3.4 any <> any any (msg:"pass all traffic from/to 1.2.3.4"; sid:1;)
|
||
|
|
||
|
A big difference with capture filters is that logs such as http.log
|
||
|
are still generated for this traffic.
|
||
|
|
||
|
suppress
|
||
|
--------
|
||
|
|
||
|
Suppress rules can be used to make sure no alerts are generated for a
|
||
|
host. This is not efficient however, as the suppression is only
|
||
|
considered post-matching. In other words, Suricata first inspects a
|
||
|
rule, and only then will it consider per-host suppressions.
|
||
|
|
||
|
Example:
|
||
|
|
||
|
::
|
||
|
|
||
|
suppress gen_id 0, sig_id 0, track by_src, ip 1.2.3.4
|