Skip to content

Commit

Permalink
Added $FW_MSG_SEARCH
Browse files Browse the repository at this point in the history
git-svn-id: file:///home/mbr/svn/psad_repos/psad/trunk@261 91a0a83b-1414-0410-bf9a-c3dbc33e90b6
  • Loading branch information
mrash committed Apr 6, 2002
1 parent fe7fa60 commit aa2e53d
Showing 1 changed file with 8 additions and 4 deletions.
12 changes: 8 additions & 4 deletions psad.conf
@@ -1,3 +1,6 @@
#
# $Id$
#
# Configuration file for the Port Scan Attack Detector (psad).
# psad just does an eval on these lines to get the variable values
# so each line must be a valid perl statement.
Expand Down Expand Up @@ -30,10 +33,11 @@ my $AUTO_IDS_DANGER_LEVEL = 5; ### Block all traffic from o
my $WHOIS_TIMEOUT = 10; ### (seconds)

### The following variable can be modified to look for logging messages
### that are specific to iptables firewalls (specified by the "--log-prefix"
### option). For example, if your firewall uses the string "Audit" for
### packets that have been blocked, then you could set $IPTABLES_MSG_SEARCH = "Audit";
my $IPTABLES_MSG_SEARCH = "DROP|DENY|REJECT";
### that are specific to your firewall configuration (specified by the
### "--log-prefix" for iptables firewalls). For example, if your firewall
### uses the string "Audit" for packets that have been blocked, then you
### could set $FW_MSG_SEARCH = "Audit";
my $FW_MSG_SEARCH = "DROP|REJECT|DENY";

### system binaries ###
my $ipchainsCmd = "/sbin/ipchains";
Expand Down

0 comments on commit aa2e53d

Please sign in to comment.