doc: Correct typos

pull/5115/head
Jeff Lucovsky 5 years ago committed by Victor Julien
parent 59cc3c6281
commit b116a56a32

@ -229,7 +229,7 @@ With any logic implemented in the eBPF filter. The value returned by the functio
tagged with the ``loadbalancer`` section is used with a modulo on the CPU count to know in tagged with the ``loadbalancer`` section is used with a modulo on the CPU count to know in
which socket the packet has to be send. which socket the packet has to be send.
An implementation of a simple symetric IP pair hashing function is provided in the ``lb.bpf`` An implementation of a simple symmetric IP pair hashing function is provided in the ``lb.bpf``
file. file.
Copy the resulting eBPF filter as needed :: Copy the resulting eBPF filter as needed ::

@ -198,7 +198,7 @@ Example Configuration - Manual Configuration
For Manual Configuration the Napatech streams are created by running NTPL For Manual Configuration the Napatech streams are created by running NTPL
commands prior to running Suricata. commands prior to running Suricata.
Note that this option is provided primarily for legacy configuations as previously Note that this option is provided primarily for legacy configurations as previously
this was the only way to configure Napatech products. Newer capabilities such as this was the only way to configure Napatech products. Newer capabilities such as
flow-awareness and inline processing cannot be configured manually. flow-awareness and inline processing cannot be configured manually.
@ -268,15 +268,15 @@ upstream and downstream traffic E.g.::
Note that these "port-pairings" are also required for IDS configurations as the hardware Note that these "port-pairings" are also required for IDS configurations as the hardware
needs to know on which port(s) two sides of the connection will arrive. needs to know on which port(s) two sides of the connection will arrive.
For configuations relying on optical taps the two sides of the pairing will typically For configurations relying on optical taps the two sides of the pairing will typically
be different ports. For SPAN port configurations where both upstream and downstream traffic be different ports. For SPAN port configurations where both upstream and downstream traffic
are delivered to a single port both sides of the "port-pair" will reference the same port. are delivered to a single port both sides of the "port-pair" will reference the same port.
For example tap configuations have a form similar to this:: For example tap configurations have a form similar to this::
ports[0-1,2-3] ports[0-1,2-3]
Whereas SPAN port configuations it would look similar to this:: Whereas SPAN port configurations it would look similar to this::
ports[0-0,1-1,2-2,3-3] ports[0-0,1-1,2-2,3-3]
@ -326,7 +326,7 @@ pass traffic matching a given signature. For example, given the rule::
pass tcp any 443 <> any any (msg: "SURICATA Test rule"; bypass; sid:1000001; rev:2;) pass tcp any 443 <> any any (msg: "SURICATA Test rule"; bypass; sid:1000001; rev:2;)
Suricata will evaluate the inital packet(s) of the flow and program the flow Suricata will evaluate the initial packet(s) of the flow and program the flow
into the hardware. Subsequent packets from the flow will be automatically be into the hardware. Subsequent packets from the flow will be automatically be
shunted from one port to it's peer. shunted from one port to it's peer.
@ -358,7 +358,7 @@ On flow-aware products the following counters are also available:
- napa_dispatch_drop.pkts, napa_dispatch_drop.byte: - napa_dispatch_drop.pkts, napa_dispatch_drop.byte:
The total number of packets/bytes that were dropped at the hardware as The total number of packets/bytes that were dropped at the hardware as
a result of a Suricata "drop" bypass rule or other ajudication by a result of a Suricata "drop" bypass rule or other adjudication by
Suricata that the flow packets should be dropped. These packets are not Suricata that the flow packets should be dropped. These packets are not
delivered to the application. delivered to the application.
@ -371,7 +371,7 @@ On flow-aware products the following counters are also available:
- napa_bypass.active_flows: - napa_bypass.active_flows:
The number of flows actively programmed on the hardware to be forwared or dropped. The number of flows actively programmed on the hardware to be forwarded or dropped.
- napa_bypass.total_flows: - napa_bypass.total_flows:

@ -207,7 +207,7 @@ Inline IDS
---------- ----------
The inline IDS is almost the same as the IPS setup above, but it will not The inline IDS is almost the same as the IPS setup above, but it will not
enfore ``drop`` policies. enforce ``drop`` policies.
:: ::

@ -2171,7 +2171,7 @@ Finally, if ``encrypt-handling`` is set to ``full``, Suricata will process the
flow as normal, without inspection limitations or bypass. flow as normal, without inspection limitations or bypass.
The option has replaced the ``no-reassemble`` option. If ``no-reassemble`` is The option has replaced the ``no-reassemble`` option. If ``no-reassemble`` is
present, and ``encrypt-handling`` is not, ``false`` is intepreted as present, and ``encrypt-handling`` is not, ``false`` is interpreted as
``encrypt-handling: default`` and ``true`` is interpreted as ``encrypt-handling: default`` and ``true`` is interpreted as
``encrypt-handling: bypass``. ``encrypt-handling: bypass``.

@ -98,7 +98,7 @@ stored file to be closed and ``<ID>`` is a unique ID for the runtime
of the Suricata instance. These values should not be depended on, and of the Suricata instance. These values should not be depended on, and
are simply used to ensure uniqueness. are simply used to ensure uniqueness.
These ``fileinfo`` records are idential to the ``fileinfo`` records These ``fileinfo`` records are identical to the ``fileinfo`` records
logged to the ``eve`` output. logged to the ``eve`` output.
See :ref:`suricata-yaml-file-store` for more information on See :ref:`suricata-yaml-file-store` for more information on

@ -175,7 +175,7 @@ HttpGetRequestBody and HttpGetResponseBody.
Make normalized body data available to the script through Make normalized body data available to the script through
HttpGetRequestBody and HttpGetResponseBody. HttpGetRequestBody and HttpGetResponseBody.
There no guarantees that all of the body will be availble. There no guarantees that all of the body will be available.
Example: Example:
@ -798,7 +798,7 @@ init function:
end end
Here we define a `tls-cnt` Flowint that can now be used in output or in a Here we define a `tls-cnt` Flowint that can now be used in output or in a
signature via dedicted functions. The access to the Flow variable is done by signature via dedicated functions. The access to the Flow variable is done by
index so in our case we need to use 0. index so in our case we need to use 0.
:: ::

@ -2,7 +2,7 @@ Lua usage in Suricata
===================== =====================
Lua scripting can be used in two components of Suricata. The first is in Lua scripting can be used in two components of Suricata. The first is in
output an the second one in rules in the detection engine. output and the second one in rules in the detection engine.
Both features are using a list of functions to access to data extracted by Both features are using a list of functions to access to data extracted by
Suricata. You can get the list of functions in the :ref:`lua-functions` page. Suricata. You can get the list of functions in the :ref:`lua-functions` page.

@ -111,7 +111,7 @@ There are several advanced steps and corner cases when it comes to a deep dive
into the traffic. into the traffic.
If VLAN QinQ (IEEE 802.1ad) is used be very cautious if you use **cluster_qm** If VLAN QinQ (IEEE 802.1ad) is used be very cautious if you use **cluster_qm**
in combinatin with Intel drivers and AF_PACKET runmode. While the RFC expects in combination with Intel drivers and AF_PACKET runmode. While the RFC expects
ethertype 0x8100 and 0x88A8 in this case (see ethertype 0x8100 and 0x88A8 in this case (see
https://en.wikipedia.org/wiki/IEEE_802.1ad) most implementations only add https://en.wikipedia.org/wiki/IEEE_802.1ad) most implementations only add
0x8100 on each layer. If the first seen layer has the same VLAN tag but the 0x8100 on each layer. If the first seen layer has the same VLAN tag but the

@ -550,7 +550,7 @@ Fast Pattern
- Using Hyperscan as the MPM matcher (``mpm-algo`` setting) for Suricata - Using Hyperscan as the MPM matcher (``mpm-algo`` setting) for Suricata
can greatly improve performance, especially when it comes to fast pattern can greatly improve performance, especially when it comes to fast pattern
matching. Hyperscan will also take in to account depth and offset matching. Hyperscan will also take in to account depth and offset
when doing fast pattern matching, something the other algorithims and when doing fast pattern matching, something the other algorithms and
Snort do not do. Snort do not do.
- :ref:`rules-keyword-fast_pattern` - :ref:`rules-keyword-fast_pattern`

@ -21,7 +21,7 @@ this means passing the same ``--prefix``, ``--sysconfdir``,
Configuration Updates Configuration Updates
~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~
New versions of Suricata will occationally include updated config files: New versions of Suricata will occasionally include updated config files:
``classification.config`` and ``reference.config``. Since the Suricata ``classification.config`` and ``reference.config``. Since the Suricata
installation will not overwrite these if they exist, they should be manually installation will not overwrite these if they exist, they should be manually
updated. If there are no local modifications they can simply be overwritten updated. If there are no local modifications they can simply be overwritten

Loading…
Cancel
Save