You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
suricata/doc/userguide/performance/ignoring-traffic.rst

47 lines
1.3 KiB
ReStructuredText

Ignoring Traffic
================
In some cases there are reasons to ignore certain traffic. Maybe a
trusted host or network, or a site. This document lists some
strategies for ignoring traffic.
capture filters (BPF)
---------------------
Through BPFs the capture methods pcap, af-packet and pf_ring can be
told what to send to Suricata, and what not. For example a simple
filter 'tcp' will only send tcp packets.
If some hosts and or nets need to be ignored, use something like "not
(host IP1 or IP2 or IP3 or net NET/24)".
pass rules
----------
Pass rules are Suricata rules that if matching, pass the packet and in
case of TCP the rest of the flow. They look like normal rules, except
that instead of 'alert' or 'drop' they start with 'pass'.
Example:
::
pass ip 1.2.3.4 any <> any any (msg:"pass all traffic from/to 1.2.3.4"; sid:1;)
A big difference with capture filters is that logs such as http.log
are still generated for this traffic.
suppress
--------
Suppress rules can be used to make sure no alerts are generated for a
host. This is not efficient however, as the suppression is only
considered post-matching. In other words, Suricata first inspects a
rule, and only then will it consider per-host suppressions.
Example:
::
suppress gen_id 0, sig_id 0, track by_src, ip 1.2.3.4