mirror of https://github.com/OISF/suricata
				
				
				
			
			You cannot select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
	
	
		
			117 lines
		
	
	
		
			3.5 KiB
		
	
	
	
		
			Plaintext
		
	
			
		
		
	
	
			117 lines
		
	
	
		
			3.5 KiB
		
	
	
	
		
			Plaintext
		
	
| Autogenerated on 2012-11-29
 | |
| from - https://redmine.openinfosecfoundation.org/projects/suricata/wiki/CentOS_56_Installation
 | |
| 
 | |
| 
 | |
| CentOS 5.6 Installation
 | |
| 
 | |
| 
 | |
| Pre-installation requirements
 | |
| 
 | |
| You will have to use the Fedora EPEL repository for some packages to enable
 | |
| this repository. It is the same for i386 and x86_64:
 | |
| 
 | |
|   sudo rpm -Uvh http://dl.fedoraproject.org/pub/epel/5/x86_64/epel-release-5-
 | |
|   4.noarch.rpm
 | |
| 
 | |
| Before you can build Suricata for your system, run the following command to
 | |
| ensure that you have everything you need for the installation.
 | |
| 
 | |
|   sudo yum -y install libpcap libpcap-devel libnet libnet-devel pcre \
 | |
|   pcre-devel gcc gcc-c++ automake autoconf libtool make libyaml \
 | |
|   libyaml-devel zlib zlib-devel
 | |
| 
 | |
| Depending on the current status of your system, it may take a while to complete
 | |
| this process.
 | |
| 
 | |
| HTP
 | |
| 
 | |
| HTP is bundled with Suricata and installed automatically. If you need to
 | |
| install HTP manually for other reasons, instructions can be found at HTP
 | |
| library_installation.
 | |
| 
 | |
| 
 | |
| IPS
 | |
| 
 | |
| 
 | |
| If you plan to build Suricata with IPS capabilities via ./configure --enable-
 | |
| nfqueue, there are no pre-built packages in the CentOS base or EPEL for
 | |
| libnfnetlink and libnetfilter_queue. If you wish, you may use the rpms in the
 | |
| Emerging Threats Cent OS 5 repository:
 | |
| i386
 | |
| 
 | |
|   sudo rpm -Uvh http://rules.emergingthreatspro.com/projects/emergingrepo/i386/
 | |
|   libnetfilter_queue-0.0.15-1.i386.rpm \
 | |
|   http://rules.emergingthreatspro.com/projects/emergingrepo/i386/
 | |
|   libnetfilter_queue-devel-0.0.15-1.i386.rpm \
 | |
|   http://rules.emergingthreatspro.com/projects/emergingrepo/i386/libnfnetlink-
 | |
|   0.0.30-1.i386.rpm \
 | |
|   http://rules.emergingthreatspro.com/projects/emergingrepo/i386/libnfnetlink-
 | |
|   devel-0.0.30-1.i386.rpm
 | |
| 
 | |
| x86_64
 | |
| 
 | |
|   sudo rpm -Uvh http://rules.emergingthreatspro.com/projects/emergingrepo/
 | |
|   x86_64/libnetfilter_queue-0.0.15-1.x86_64.rpm \
 | |
|   http://rules.emergingthreatspro.com/projects/emergingrepo/x86_64/
 | |
|   libnetfilter_queue-devel-0.0.15-1.x86_64.rpm \
 | |
|   http://rules.emergingthreatspro.com/projects/emergingrepo/x86_64/
 | |
|   libnfnetlink-0.0.30-1.x86_64.rpm \
 | |
|   http://rules.emergingthreatspro.com/projects/emergingrepo/x86_64/
 | |
|   libnfnetlink-devel-0.0.30-1.x86_64.rpm
 | |
| 
 | |
| 
 | |
| libcap-ng installation
 | |
| 
 | |
| This installation is needed for dropping privileges.
 | |
| 
 | |
|   wget http://people.redhat.com/sgrubb/libcap-ng/libcap-ng-0.6.4.tar.gz
 | |
|   tar -xzvf libcap-ng-0.6.4.tar.gz
 | |
|   cd libcap-ng-0.6.4
 | |
|   ./configure
 | |
|   make
 | |
|   sudo make install
 | |
| 
 | |
| 
 | |
| Suricata
 | |
| 
 | |
| To download and build Suricata, enter the following:
 | |
| 
 | |
|   wget http://www.openinfosecfoundation.org/download/suricata-1.3.3.tar.gz
 | |
|   tar -xvzf suricata-1.3.3.tar.gz
 | |
|   cd suricata-1.3.3
 | |
| 
 | |
| If you are building from Git sources, enter all the following commands:
 | |
| 
 | |
|   bash autogen.sh
 | |
| 
 | |
| If you are not building from Git sources, enter only:
 | |
| 
 | |
|   ./configure --prefix=/usr --sysconfdir=/etc --localstatedir=/var
 | |
|   make
 | |
|   sudo make install
 | |
| 
 | |
| 
 | |
| Auto setup
 | |
| 
 | |
| You can also use the available auto setup features of Suricata:
 | |
| ex:
 | |
| 
 | |
|      ./configure && make && make install-conf
 | |
| 
 | |
| make install-conf
 | |
| would do the regular "make install" and then it would automatically create/
 | |
| setup all the necessary directories and suricata.yaml for you.
 | |
| 
 | |
|      ./configure && make && make install-rules
 | |
| 
 | |
| make install-rules
 | |
| would do the regular "make install" and then it would automatically download
 | |
| and set up the latest ruleset from Emerging Threats available for Suricata
 | |
| 
 | |
|      ./configure && make && make install-full
 | |
| 
 | |
| make install-full
 | |
| would combine everything mentioned above (install-conf and install-rules) - and
 | |
| will present you with a ready to run (configured and set up) Suricata
 | |
| Please continue with the Basic_Setup.
 |