<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://msc.siamtools.com/wiki/index.php?action=history&amp;feed=atom&amp;title=PSAD_Vuurmuur_Portscan_Prevention</id>
		<title>PSAD Vuurmuur Portscan Prevention - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://msc.siamtools.com/wiki/index.php?action=history&amp;feed=atom&amp;title=PSAD_Vuurmuur_Portscan_Prevention"/>
		<link rel="alternate" type="text/html" href="https://msc.siamtools.com/wiki/index.php?title=PSAD_Vuurmuur_Portscan_Prevention&amp;action=history"/>
		<updated>2026-05-01T19:32:31Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.28.0</generator>

	<entry>
		<id>https://msc.siamtools.com/wiki/index.php?title=PSAD_Vuurmuur_Portscan_Prevention&amp;diff=327&amp;oldid=prev</id>
		<title>Snifer at 11:53, 16 December 2008</title>
		<link rel="alternate" type="text/html" href="https://msc.siamtools.com/wiki/index.php?title=PSAD_Vuurmuur_Portscan_Prevention&amp;diff=327&amp;oldid=prev"/>
				<updated>2008-12-16T11:53:51Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 11:53, 16 December 2008&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l556&quot; &gt;Line 556:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 556:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;ใน vuurmuur_conf&amp;lt;br&amp;gt; &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;ใน vuurmuur_conf&amp;lt;br&amp;gt; &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;drop service any from world.inet to firewall options log,logprefix=&amp;quot;PSAD&amp;quot;&amp;lt;br&amp;gt;Chain service any from any to any options chain=&amp;quot;PSAD-AUTO-IDS&amp;quot;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;drop service any from world.inet to firewall options log,logprefix=&amp;quot;PSAD&amp;quot;&amp;lt;br&amp;gt;Chain service any from any to any options chain=&amp;quot;PSAD-AUTO-IDS&amp;quot;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;pre&amp;gt;#/etc/init.d/psad restart&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;pre&amp;gt;#/etc/init.d/psad restart&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/pre&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/pre&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;gt; &lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;'''สิ่งที่แก้ไขใน psad.conf'''&amp;lt;br&lt;/ins&gt;&amp;gt; &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;'''สิ่งที่แก้ไขใน psad.conf'''&lt;/del&gt;&amp;lt;br&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;FW_MSG_SEARCH vrmr: DROP;&lt;/ins&gt;&amp;lt;br&amp;gt; &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;FW_MSG_SEARCH vrmr: &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;DROP&lt;/del&gt;;&amp;lt;br&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;FW_MSG_SEARCH vrmr: &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;REJECT&lt;/ins&gt;;&amp;lt;br&amp;gt; &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;FW_MSG_SEARCH vrmr: &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;REJECT&lt;/del&gt;;&amp;lt;br&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;FW_MSG_SEARCH vrmr: &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;DROP PSAD&lt;/ins&gt;;&amp;lt;br&amp;gt; &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;FW_MSG_SEARCH vrmr: DROP PSAD&lt;/del&gt;;&amp;lt;br&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;ENABLE_AUTO_IDS Y&lt;/ins&gt;;&amp;lt;br&amp;gt; &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;ENABLE_AUTO_IDS Y&lt;/del&gt;;&amp;lt;br&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;AUTO_IDS_DANGER_LEVEL 1&lt;/ins&gt;;&amp;lt;br&amp;gt; &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;AUTO_IDS_DANGER_LEVEL 1&lt;/del&gt;;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;br&amp;gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;AUTO_BLOCK_TIMEOUT 3600&lt;/ins&gt;; &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;AUTO_BLOCK_TIMEOUT 3600&lt;/del&gt;;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;IPTABLES_BLOCK_METHOD Y&lt;/ins&gt;; &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;IPTABLES_BLOCK_METHOD Y&lt;/del&gt;;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;IPTABLES_AUTO_RULENUM 1&lt;/ins&gt;; &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;IPTABLES_AUTO_RULENUM 1&lt;/del&gt;;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;IPT_AUTO_CHAIN1 DROP, src, filter, PSAD-AUTO-IDS, PSAD_BLOCK_INPUT&lt;/ins&gt;; &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;IPT_AUTO_CHAIN1 &lt;/del&gt;DROP, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;src&lt;/del&gt;, filter, PSAD-AUTO-IDS, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;PSAD_BLOCK_INPUT&lt;/del&gt;;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;IPT_AUTO_CHAIN2 &lt;/ins&gt;DROP, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;dst&lt;/ins&gt;, filter, PSAD-AUTO-IDS, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;PSAD_BLOCK_OUTPUT&lt;/ins&gt;; &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;IPT_AUTO_CHAIN2 &lt;/del&gt;DROP, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;dst&lt;/del&gt;, filter, PSAD-AUTO-IDS, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;PSAD_BLOCK_OUTPUT&lt;/del&gt;;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;IPT_AUTO_CHAIN3 &lt;/ins&gt;DROP, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;both&lt;/ins&gt;, filter, PSAD-AUTO-IDS, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;PSAD_BLOCK_FORWARD&lt;/ins&gt;;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;br&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;IPT_AUTO_CHAIN3 DROP, both, filter, PSAD-AUTO-IDS, PSAD_BLOCK_FORWARD;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;/del&gt;&amp;lt;br&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;เกือบลืม&lt;/ins&gt;&amp;lt;br&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;br&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;แก้ syslog ด้วย&lt;/ins&gt;&amp;lt;br&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;pre&amp;gt;kern.info&amp;#160; &amp;#160; &amp;#160;  		|/var/lib/psad/psadfifo&amp;lt;/pre&lt;/ins&gt;&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;br&lt;/del&gt;&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Snifer</name></author>	</entry>

	<entry>
		<id>https://msc.siamtools.com/wiki/index.php?title=PSAD_Vuurmuur_Portscan_Prevention&amp;diff=326&amp;oldid=prev</id>
		<title>Snifer: New page: วิธีการติดตั้ง PSAD บนระบบปฏิบัติการ Etch4 ตามแบบฉบับของ MSC &lt;br&gt;   &lt;br&gt;  &lt;pre&gt;#apt-get install psad &lt;...</title>
		<link rel="alternate" type="text/html" href="https://msc.siamtools.com/wiki/index.php?title=PSAD_Vuurmuur_Portscan_Prevention&amp;diff=326&amp;oldid=prev"/>
				<updated>2008-12-16T11:51:58Z</updated>
		
		<summary type="html">&lt;p&gt;New page: วิธีการติดตั้ง PSAD บนระบบปฏิบัติการ Etch4 ตามแบบฉบับของ MSC &amp;lt;br&amp;gt;   &amp;lt;br&amp;gt;  &amp;lt;pre&amp;gt;#apt-get install psad &amp;lt;...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;วิธีการติดตั้ง PSAD บนระบบปฏิบัติการ Etch4 ตามแบบฉบับของ MSC &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;pre&amp;gt;#apt-get install psad&lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;pre&amp;gt;#apt-get remove psad&lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;pre&amp;gt;#wget http://www.cipherdyne.com/psad/download/psad-2.1.4.tar.bz2&lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;pre&amp;gt;#tar jxvf psad-2.1.4.tar.bz2&lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;pre&amp;gt;#nano /etc/psad/psad.conf &lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;pre&amp;gt;#&lt;br /&gt;
##############################################################################&lt;br /&gt;
#&lt;br /&gt;
#  This is the configuration file for psad (the Port Scan Attack Detector).&lt;br /&gt;
#  Normally this file gets installed at /etc/psad/psad.conf, but can be put&lt;br /&gt;
#  anywhere in the filesystem and then the path can be specified on the&lt;br /&gt;
#  command line argument &amp;quot;-c &amp;amp;lt;file&amp;amp;gt;&amp;quot; to psad.  All three psad daemons (psad,&lt;br /&gt;
#  kmsgsd, and psadwatchd) reference this config file.&lt;br /&gt;
#&lt;br /&gt;
#  Each line has the form  &amp;quot;&amp;amp;lt;variable name&amp;amp;gt;    &amp;amp;lt;value&amp;amp;gt;;&amp;quot;.  Note the semi-&lt;br /&gt;
#  colon after the &amp;amp;lt;value&amp;amp;gt;.  All characters after the semicolon will be&lt;br /&gt;
#  ignored to provide space for comments.&lt;br /&gt;
#&lt;br /&gt;
##############################################################################&lt;br /&gt;
#&lt;br /&gt;
# $Id: psad.conf 2179 2008-06-07 15:21:55Z mbr $&lt;br /&gt;
#&lt;br /&gt;
&lt;br /&gt;
### Supports multiple email addresses (as a comma separated&lt;br /&gt;
### list).&lt;br /&gt;
EMAIL_ADDRESSES             xen@xen-ro.com;&lt;br /&gt;
&lt;br /&gt;
### Machine hostname&lt;br /&gt;
HOSTNAME                    xenea;&lt;br /&gt;
&lt;br /&gt;
### Specify the home and external networks.  Note that by default the&lt;br /&gt;
### ENABLE_INTF_LOCAL_NETS is enabled, so psad automatically detects&lt;br /&gt;
### all of the directly connected subnets and uses this information as&lt;br /&gt;
#@@ the HOME_NET variable.&lt;br /&gt;
HOME_NET                    NOT_USED;&lt;br /&gt;
EXTERNAL_NET                any;&lt;br /&gt;
&lt;br /&gt;
### The FW_SEARCH_ALL variable controls has psad will parse iptables&lt;br /&gt;
### messages.  If it is set to &amp;quot;Y&amp;quot; then psad will parse all iptables&lt;br /&gt;
### messages for evidence of scan activity.  If it is set to &amp;quot;N&amp;quot; then&lt;br /&gt;
### psad will only parse those iptables messages that contain logging&lt;br /&gt;
### prefixes specified by the FW_MSG_SEARCH variable below.  Logging&lt;br /&gt;
### prefixes are set with the --log-prefix command line option to iptables.&lt;br /&gt;
### Setting FW_SEARCH_ALL to &amp;quot;N&amp;quot; is useful for having psad only analyze&lt;br /&gt;
### iptables messages that are logged out of a specific iptables chain&lt;br /&gt;
### (multiple strings can be searched for, see the comment above the&lt;br /&gt;
### FW_MSG_SEARCH variable below) or a specific logging rule for example.&lt;br /&gt;
### FW_SEARCH_ALL is set to &amp;quot;Y&amp;quot; by default since usually people want psad&lt;br /&gt;
### to parse all iptables messages.&lt;br /&gt;
FW_SEARCH_ALL               N;&lt;br /&gt;
&lt;br /&gt;
### The FW_MSG_SEARCH variable can be modified to look for logging messages&lt;br /&gt;
### that are specific to your firewall configuration (specified by the&lt;br /&gt;
### &amp;quot;--log-prefix&amp;quot; option.  For example, if your firewall uses the&lt;br /&gt;
### string &amp;quot;Audit&amp;quot; for packets that have been blocked, then you could&lt;br /&gt;
### set FW_MSG_SEARCH to &amp;quot;Audit&amp;quot;;  The default string to search for is&lt;br /&gt;
### &amp;quot;DROP&amp;quot;.  Both psad and kmsgsd reference this file.  NOTE: You can&lt;br /&gt;
### specify this variable multiple times to have psad search for multiple&lt;br /&gt;
### strings.  For example to have psad search for the strings &amp;quot;Audit&amp;quot; and&lt;br /&gt;
### &amp;quot;Reject&amp;quot;, you would use the following two lines:&lt;br /&gt;
#FW_MSG_SEARCH               Audit;&lt;br /&gt;
#FW_MSG_SEARCH               REJECT;&lt;br /&gt;
FW_MSG_SEARCH               Audit;&lt;br /&gt;
FW_MSG_SEARCH vrmr: DROP;&lt;br /&gt;
FW_MSG_SEARCH vrmr: REJECT;&lt;br /&gt;
FW_MSG_SEARCH vrmr: DROP PSAD;&lt;br /&gt;
&lt;br /&gt;
### Set the type of syslog daemon that is used.  The SYSLOG_DAEMON&lt;br /&gt;
### variable accepts four possible values: syslogd, syslog-ng, ulogd,&lt;br /&gt;
### or metalog.&lt;br /&gt;
SYSLOG_DAEMON               syslogd;&lt;br /&gt;
&lt;br /&gt;
### Danger levels.  These represent the total number of&lt;br /&gt;
### packets required for a scan to reach each danger level.&lt;br /&gt;
### A scan may also reach a danger level if the scan trips&lt;br /&gt;
### a signature or if the scanning ip is listed in&lt;br /&gt;
### auto_ips so a danger level is automatically&lt;br /&gt;
### assigned.&lt;br /&gt;
DANGER_LEVEL1               5;    ### Number of packets.&lt;br /&gt;
DANGER_LEVEL2               15;&lt;br /&gt;
DANGER_LEVEL3               150;&lt;br /&gt;
DANGER_LEVEL4               1500;&lt;br /&gt;
DANGER_LEVEL5               10000;&lt;br /&gt;
&lt;br /&gt;
### Set the interval (in seconds) psad will use to sleep before&lt;br /&gt;
### checking for new iptables log messages&lt;br /&gt;
CHECK_INTERVAL              5;&lt;br /&gt;
&lt;br /&gt;
### Search for snort &amp;quot;sid&amp;quot; values generated by fwsnort&lt;br /&gt;
### or snort2iptables&lt;br /&gt;
SNORT_SID_STR               SID;&lt;br /&gt;
&lt;br /&gt;
### Set the minimum range of ports that must be scanned before&lt;br /&gt;
### psad will send an alert.  The default is 1 so that at&lt;br /&gt;
### least two port must be scanned (p2-p1 &amp;amp;gt;= 1).  This can be set&lt;br /&gt;
### to 0 if you want psad to be extra paranoid, or 30000 if not.&lt;br /&gt;
PORT_RANGE_SCAN_THRESHOLD   1;&lt;br /&gt;
&lt;br /&gt;
### If &amp;quot;Y&amp;quot;, means that scans will never timeout.  This is useful&lt;br /&gt;
### for catching scans that take place over long periods of time&lt;br /&gt;
### where the attacker is trying to slip beneath the IDS thresholds.&lt;br /&gt;
ENABLE_PERSISTENCE          Y;&lt;br /&gt;
&lt;br /&gt;
### This is used only if ENABLE_PERSISTENCE = &amp;quot;N&amp;quot;;&lt;br /&gt;
SCAN_TIMEOUT                3600;  ### seconds&lt;br /&gt;
&lt;br /&gt;
### If &amp;quot;Y&amp;quot;, means all signatures will be shown since&lt;br /&gt;
### the scan started instead of just the current ones.&lt;br /&gt;
SHOW_ALL_SIGNATURES         N;&lt;br /&gt;
&lt;br /&gt;
### Allow reporting methods to be enabled/restricted.  This keyword can&lt;br /&gt;
### accept values of &amp;quot;nosyslog&amp;quot; (don't write any messages to syslog),&lt;br /&gt;
### &amp;quot;noemail&amp;quot; (don't send any email messages), or &amp;quot;ALL&amp;quot; (to generate both&lt;br /&gt;
### syslog and email messages).  &amp;quot;ALL&amp;quot; is the default.  Both &amp;quot;nosyslog&amp;quot;&lt;br /&gt;
### and &amp;quot;noemail&amp;quot; can be combined with a comma to disable all logging&lt;br /&gt;
### and alerting.&lt;br /&gt;
ALERTING_METHODS            ALL;&lt;br /&gt;
&lt;br /&gt;
### By default, psad acquires iptables log data from the /var/log/psad/fwdata&lt;br /&gt;
### file which is written to by kmsgsd.  However, psad can just read an&lt;br /&gt;
### existing file that syslog writes iptables log data to (commonly&lt;br /&gt;
### /var/log/messages).  On some systems, having syslog communicate log data&lt;br /&gt;
### to kmsgsd can be problematic (syslog configs and external factors such&lt;br /&gt;
### as Apparmor and SELinux can play a role here), so using this feature can&lt;br /&gt;
### simplify a psad deployment.&lt;br /&gt;
ENABLE_SYSLOG_FILE          Y;&lt;br /&gt;
IPT_WRITE_FWDATA            Y;&lt;br /&gt;
IPT_SYSLOG_FILE             /var/log/messages;&lt;br /&gt;
&lt;br /&gt;
### When enabled, this instructs psad to write the &amp;quot;msg&amp;quot; field&lt;br /&gt;
### associated with Snort rule matches to syslog.&lt;br /&gt;
ENABLE_SIG_MSG_SYSLOG       Y;&lt;br /&gt;
SIG_MSG_SYSLOG_THRESHOLD    10;&lt;br /&gt;
SIG_SID_SYSLOG_THRESHOLD    10;&lt;br /&gt;
&lt;br /&gt;
### TTL values are decremented depending on the number of hops&lt;br /&gt;
### the packet has taken before it hits the firewall.  We will&lt;br /&gt;
### assume packets will not jump through more than 20 hops on&lt;br /&gt;
### average.&lt;br /&gt;
MAX_HOPS                    20;&lt;br /&gt;
&lt;br /&gt;
### Do not include any timestamp included within kernel logging&lt;br /&gt;
### messages (Ubuntu systems commonly have this)&lt;br /&gt;
IGNORE_KERNEL_TIMESTAMP     Y;&lt;br /&gt;
&lt;br /&gt;
### FIXME: try to mitigate the affects of the iptables connection&lt;br /&gt;
### tracking bug by ignoring tcp packets that have the ack bit set.&lt;br /&gt;
### Read the &amp;quot;BUGS&amp;quot; section of the psad man page.  Note that&lt;br /&gt;
### if a packet matches a snort SID generated by fwsnort (see&lt;br /&gt;
### http://www.cipherdyne.org/fwsnort/)&lt;br /&gt;
### then psad will see it even if the ack bit is set.  See the&lt;br /&gt;
### SNORT_SID_STR variable.&lt;br /&gt;
IGNORE_CONNTRACK_BUG_PKTS   Y;&lt;br /&gt;
&lt;br /&gt;
### define a set of ports to ignore (this is useful particularly&lt;br /&gt;
### for port knocking applications since the knock sequence will&lt;br /&gt;
### look to psad like a scan).  This variable may be defined as&lt;br /&gt;
### a comma-separated list of port numbers or port ranges and&lt;br /&gt;
### corresponding protocol,  For example, to have psad ignore all&lt;br /&gt;
### tcp in the range 61000-61356 and udp ports 53 and 5000, use:&lt;br /&gt;
### IGNORE_PORTS        tcp/61000-61356, udp/53, udp/5000;&lt;br /&gt;
IGNORE_PORTS                udp/53, udp/5000;&lt;br /&gt;
&lt;br /&gt;
### allow entire protocols to be ignored.  This keyword can accept&lt;br /&gt;
### a comma separated list of protocols.  Each protocol must match&lt;br /&gt;
### the protocol that is specified in a Netfilter log message (case&lt;br /&gt;
### insensitively, so both &amp;quot;TCP&amp;quot; or &amp;quot;tcp&amp;quot; is ok).&lt;br /&gt;
### IGNORE_PROTOCOL             tcp,udp;&lt;br /&gt;
IGNORE_PROTOCOLS            NONE;&lt;br /&gt;
&lt;br /&gt;
### allow packets to be ignored based on interface (this is the&lt;br /&gt;
### &amp;quot;IN&amp;quot; interface in Nefilter logging messages).&lt;br /&gt;
IGNORE_INTERFACES           NONE;&lt;br /&gt;
&lt;br /&gt;
### Ignore these specific logging prefixes&lt;br /&gt;
IGNORE_LOG_PREFIXES         NONE;&lt;br /&gt;
&lt;br /&gt;
### Minimum danger level a scan must reach before any logging or&lt;br /&gt;
### alerting is done.  The EMAIL_ALERT_DANGER_LEVEL variable below&lt;br /&gt;
### only refers to email alerts; the MIN_DANGER_LEVEL variable&lt;br /&gt;
### applies to everything from email alerts to whether or not the&lt;br /&gt;
### IP directory is created within /var/log/psad/.  Hence&lt;br /&gt;
### MIN_DANGER_LEVEL should be set less than or equal to the value&lt;br /&gt;
### assigned to the EMAIL_ALERT_DANGER_LEVEL variable.&lt;br /&gt;
MIN_DANGER_LEVEL            1;&lt;br /&gt;
&lt;br /&gt;
### Only send email alert if danger level &amp;amp;gt;= to this value.&lt;br /&gt;
EMAIL_ALERT_DANGER_LEVEL    1;&lt;br /&gt;
&lt;br /&gt;
### Treat all subnets on local interfaces as part of HOME_NET (this&lt;br /&gt;
### means that these networks do not have to be manually defined)&lt;br /&gt;
ENABLE_INTF_LOCAL_NETS      Y;&lt;br /&gt;
&lt;br /&gt;
### Include MAC addresses in email alert&lt;br /&gt;
ENABLE_MAC_ADDR_REPORTING   Y;&lt;br /&gt;
&lt;br /&gt;
### Look for the Netfilter logging rule (fwcheck_psad is executed)&lt;br /&gt;
ENABLE_FW_LOGGING_CHECK     Y;&lt;br /&gt;
&lt;br /&gt;
### Send no more than this number of emails for a single&lt;br /&gt;
### scanning source IP.  Note that enabling this feature may cause&lt;br /&gt;
### alerts for real attacks to not be generated if an attack is sent&lt;br /&gt;
### after the email threshold has been reached for an IP address.&lt;br /&gt;
### This is why the default is set to &amp;quot;0&amp;quot;.&lt;br /&gt;
EMAIL_LIMIT                 0;&lt;br /&gt;
&lt;br /&gt;
### By default, psad maintains a counter for each scanning source address,&lt;br /&gt;
### but by enabling this variable psad will maintain email counters for&lt;br /&gt;
### each victim address that is scanned as well.&lt;br /&gt;
ENABLE_EMAIL_LIMIT_PER_DST  N;&lt;br /&gt;
&lt;br /&gt;
### If &amp;quot;Y&amp;quot;, send a status email message when an IP has reached the&lt;br /&gt;
### EMAIL_LIMIT threshold.&lt;br /&gt;
EMAIL_LIMIT_STATUS_MSG      Y;&lt;br /&gt;
&lt;br /&gt;
### If &amp;quot;Y&amp;quot;, send email for all newly logged packets from the same&lt;br /&gt;
### source ip instead of just when a danger level increases.&lt;br /&gt;
ALERT_ALL                   Y;&lt;br /&gt;
&lt;br /&gt;
### If &amp;quot;Y&amp;quot;, then psad will import old scan source ip directories&lt;br /&gt;
### as current scans instead of moving the directories into the&lt;br /&gt;
### archive directory.&lt;br /&gt;
IMPORT_OLD_SCANS            N;&lt;br /&gt;
&lt;br /&gt;
### syslog facility and priority (the defaults are usually ok)&lt;br /&gt;
### The SYSLOG_FACILITY variable can be set to one of LOG_LOCAL{0-7}, and&lt;br /&gt;
### SYSLOG_PRIORITY can be set to one of LOG_INFO, LOG_DEBUG, LOG_NOTICE,&lt;br /&gt;
### LOG_WARNING, LOG_ERR, LOG_CRIT, LOG_ALERT, or LOG_EMERG&lt;br /&gt;
SYSLOG_IDENTITY             psad;&lt;br /&gt;
SYSLOG_FACILITY             LOG_LOCAL7;&lt;br /&gt;
SYSLOG_PRIORITY             LOG_INFO;&lt;br /&gt;
&lt;br /&gt;
### Port thresholds for logging and -S and -A output.&lt;br /&gt;
TOP_PORTS_LOG_THRESHOLD     500;&lt;br /&gt;
STATUS_PORTS_THRESHOLD      20;&lt;br /&gt;
&lt;br /&gt;
### Signature thresholds for logging and -S and -A output.&lt;br /&gt;
TOP_SIGS_LOG_THRESHOLD      500;&lt;br /&gt;
STATUS_SIGS_THRESHOLD       50;&lt;br /&gt;
&lt;br /&gt;
### Attackers thresholds for logging and -S and -A output.&lt;br /&gt;
TOP_IP_LOG_THRESHOLD        500;&lt;br /&gt;
STATUS_IP_THRESHOLD         25;&lt;br /&gt;
&lt;br /&gt;
### Specify how often to log the TOP_* information (i.e. how many&lt;br /&gt;
### CHECK_INTERVAL iterations before the data is logged again).&lt;br /&gt;
TOP_SCANS_CTR_THRESHOLD     1;&lt;br /&gt;
&lt;br /&gt;
### Send scan logs to dshield.org.  This is disabled by default,&lt;br /&gt;
### but is a good idea to enable it (subject to your site security&lt;br /&gt;
### policy) since the DShield service helps to track the bad guys.&lt;br /&gt;
### For more information visit http://www.dshield.org&lt;br /&gt;
ENABLE_DSHIELD_ALERTS       Y;&lt;br /&gt;
&lt;br /&gt;
### dshield.org alert email address; this should not be changed&lt;br /&gt;
### unless the guys at DShield have changed it.&lt;br /&gt;
DSHIELD_ALERT_EMAIL         reports@dshield.org;&lt;br /&gt;
&lt;br /&gt;
### Time interval (hours) to send email alerts to dshield.org.&lt;br /&gt;
### The default is 6 hours, and cannot be less than 1 hour or&lt;br /&gt;
### more than 24 hours.&lt;br /&gt;
DSHIELD_ALERT_INTERVAL      6;  ### hours&lt;br /&gt;
&lt;br /&gt;
### If you have a DShield user id you can set it here.  The&lt;br /&gt;
### default is &amp;quot;0&amp;quot;.&lt;br /&gt;
DSHIELD_USER_ID             0;&lt;br /&gt;
&lt;br /&gt;
### If you want the outbound DShield email to appear as though it&lt;br /&gt;
### is coming from a particular user address then set it here.&lt;br /&gt;
DSHIELD_USER_EMAIL          NONE;&lt;br /&gt;
&lt;br /&gt;
### Threshold danger level for DShield data; a scan must reach this&lt;br /&gt;
### danger level before associated packets will be included in an&lt;br /&gt;
### alert to DShield.  Note that zero is the default since this&lt;br /&gt;
### will allow DShield to apply its own logic to determine what&lt;br /&gt;
### constitutes a scan (_all_ iptables log messages will be included&lt;br /&gt;
### in DShield email alerts).&lt;br /&gt;
DSHIELD_DL_THRESHOLD        0;&lt;br /&gt;
&lt;br /&gt;
### List of servers.  Fwsnort supports the same variable resolution as&lt;br /&gt;
#### Snort.&lt;br /&gt;
HTTP_SERVERS                $HOME_NET;&lt;br /&gt;
SMTP_SERVERS                $HOME_NET;&lt;br /&gt;
DNS_SERVERS                 $HOME_NET;&lt;br /&gt;
SQL_SERVERS                 $HOME_NET;&lt;br /&gt;
TELNET_SERVERS              $HOME_NET;&lt;br /&gt;
&lt;br /&gt;
#### AOL AIM server nets&lt;br /&gt;
AIM_SERVERS                 [64.12.24.0/24, 64.12.25.0/24, 64.12.26.14/24, 64.12.28.0/24, 64.12.29.0/24, 64.12.161.0/24, 64.12.163.0/24, 205.188.5.0/24, 205.188.9.0/24];&lt;br /&gt;
&lt;br /&gt;
### Configurable port numbers&lt;br /&gt;
HTTP_PORTS                  80;&lt;br /&gt;
SHELLCODE_PORTS            &amp;amp;nbsp;!80;&lt;br /&gt;
ORACLE_PORTS                1521;&lt;br /&gt;
&lt;br /&gt;
### If this is enabled, then psad will die if a rule in the&lt;br /&gt;
### /etc/psad/signatures file contains an unsupported option (otherwise&lt;br /&gt;
### a syslog warning will be generated).&lt;br /&gt;
ENABLE_SNORT_SIG_STRICT     Y;&lt;br /&gt;
&lt;br /&gt;
### If &amp;quot;Y&amp;quot;, enable automated IDS response (auto manages&lt;br /&gt;
### firewall rulesets).&lt;br /&gt;
ENABLE_AUTO_IDS             Y;&lt;br /&gt;
&lt;br /&gt;
### Block all traffic from offending IP if danger&lt;br /&gt;
### level &amp;amp;gt;= to this value&lt;br /&gt;
AUTO_IDS_DANGER_LEVEL       5;&lt;br /&gt;
&lt;br /&gt;
### Set the auto-blocked timeout in seconds (the default&lt;br /&gt;
### is one hour).&lt;br /&gt;
AUTO_BLOCK_TIMEOUT          3600;&lt;br /&gt;
&lt;br /&gt;
### Enable regex checking on log prefixes for active response&lt;br /&gt;
ENABLE_AUTO_IDS_REGEX       N;&lt;br /&gt;
&lt;br /&gt;
### Only block if the Netfilter log message matches the following regex&lt;br /&gt;
AUTO_BLOCK_REGEX            ESTAB;  ### from fwsnort logging prefixes&lt;br /&gt;
&lt;br /&gt;
### Control whether &amp;quot;renew&amp;quot; auto-block emails get sent.  This is disabled&lt;br /&gt;
### by default because lots of IPs could have been blocked, and psad&lt;br /&gt;
### should not generate a renew email for each of them.&lt;br /&gt;
ENABLE_RENEW_BLOCK_EMAILS   N;&lt;br /&gt;
&lt;br /&gt;
### By setting this variable to N, all auto-blocking emails can be&lt;br /&gt;
### suppressed.&lt;br /&gt;
ENABLE_AUTO_IDS_EMAILS      Y;&lt;br /&gt;
&lt;br /&gt;
### Enable iptables blocking (only gets enabled if&lt;br /&gt;
### ENABLE_AUTO_IDS is also set)&lt;br /&gt;
IPTABLES_BLOCK_METHOD       Y;&lt;br /&gt;
IPTABLES_AUTO_RULENUM	1;&lt;br /&gt;
IPT_AUTO_CHAIN1 DROP, src, filter, PSAD-AUTO-IDS, PSAD_BLOCK_INPUT;&lt;br /&gt;
IPT_AUTO_CHAIN2 DROP, dst, filter, PSAD-AUTO-IDS, PSAD_BLOCK_OUTPUT;&lt;br /&gt;
IPT_AUTO_CHAIN3 DROP, both, filter, PSAD-AUTO-IDS, PSAD_BLOCK_FORWARD;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
### Specify chain names to which iptables blocking rules will be&lt;br /&gt;
### added with the IPT_AUTO_CHAIN{n} keyword.  There is no limit on the&lt;br /&gt;
### number of IPT_AUTO_CHAIN{n} keywords; just increment the {n} number&lt;br /&gt;
### to add an additional IPT_AUTO_CHAIN requirement. The format for this&lt;br /&gt;
### variable is: &amp;amp;lt;Target&amp;amp;gt;,&amp;amp;lt;Direction&amp;amp;gt;,&amp;amp;lt;Table&amp;amp;gt;,&amp;amp;lt;From_chain&amp;amp;gt;,&amp;amp;lt;Jump_rule_position&amp;amp;gt;, \&lt;br /&gt;
###              &amp;amp;lt;To_chain&amp;amp;gt;,&amp;amp;lt;Rule_position&amp;amp;gt;.&lt;br /&gt;
### &amp;quot;Target&amp;quot;: Can be any legitimate Netfilter target, but should usually&lt;br /&gt;
###           just be &amp;quot;DROP&amp;quot;.&lt;br /&gt;
### &amp;quot;Direction&amp;quot;: Can be &amp;quot;src&amp;quot;, &amp;quot;dst&amp;quot;, or &amp;quot;both&amp;quot;, which correspond to the&lt;br /&gt;
###              INPUT, OUTPUT, and FORWARD chains.&lt;br /&gt;
### &amp;quot;Table&amp;quot;: Can be any Netfilter table, but the default is &amp;quot;filter&amp;quot;.&lt;br /&gt;
### &amp;quot;From_chain&amp;quot;: Is the chain from which packets will be jumped.&lt;br /&gt;
### &amp;quot;Jump_rule_position&amp;quot;: Defines the position within the From_chain where&lt;br /&gt;
###                       the jump rule is added.&lt;br /&gt;
### &amp;quot;To_chain&amp;quot;: Is the chain to which packets will be jumped. This is the&lt;br /&gt;
###             main chain where psad rules are added.&lt;br /&gt;
### &amp;quot;Rule_position&amp;quot;: Defines the position where rule are added within the&lt;br /&gt;
###                  To_chain.&lt;br /&gt;
###&lt;br /&gt;
### The following defaults make sense for most installations, but note&lt;br /&gt;
### it is possible to include blocking rules in, say, the &amp;quot;nat&amp;quot; table&lt;br /&gt;
### using this functionality as well.  The following three lines provide&lt;br /&gt;
### usage examples:&lt;br /&gt;
#IPT_AUTO_CHAIN1              DROP, src, filter, INPUT, 1, PSAD_BLOCK_INPUT, 1;&lt;br /&gt;
#IPT_AUTO_CHAIN2              DROP, dst, filter, OUTPUT, 1, PSAD_BLOCK_OUTPUT, 1;&lt;br /&gt;
#IPT_AUTO_CHAIN3              DROP, both, filter, FORWARD, 1, PSAD_BLOCK_FORWARD, 1;&lt;br /&gt;
#IPT_AUTO_CHAIN1             DROP, src, filter, INPUT, 1, PSAD_BLOCK_INPUT, 1;&lt;br /&gt;
#IPT_AUTO_CHAIN2             DROP, dst, filter, OUTPUT, 1, PSAD_BLOCK_OUTPUT, 1;&lt;br /&gt;
#IPT_AUTO_CHAIN3             DROP, both, filter, FORWARD, 1, PSAD_BLOCK_FORWARD, 1;&lt;br /&gt;
&lt;br /&gt;
### Flush all existing rules in the psad chains at psad start time.&lt;br /&gt;
FLUSH_IPT_AT_INIT           Y;&lt;br /&gt;
&lt;br /&gt;
### Prerequisite check for existence of psad chains and jump rules&lt;br /&gt;
IPTABLES_PREREQ_CHECK       1;&lt;br /&gt;
&lt;br /&gt;
### Enable tcp wrappers blocking (only gets enabled if&lt;br /&gt;
### ENABLE_AUTO_IDS is also set)&lt;br /&gt;
TCPWRAPPERS_BLOCK_METHOD    N;&lt;br /&gt;
&lt;br /&gt;
### Set the whois timeout&lt;br /&gt;
WHOIS_TIMEOUT               60;  ### seconds&lt;br /&gt;
&lt;br /&gt;
### Set the number of times an ip can be seen before another whois&lt;br /&gt;
### lookup is issued.&lt;br /&gt;
WHOIS_LOOKUP_THRESHOLD      20;&lt;br /&gt;
&lt;br /&gt;
### Set the number of times an ip can be seen before another dns&lt;br /&gt;
### lookup is issued.&lt;br /&gt;
DNS_LOOKUP_THRESHOLD        20;&lt;br /&gt;
&lt;br /&gt;
### Enable psad to run an external script or program (use at your&lt;br /&gt;
### own risk!)&lt;br /&gt;
ENABLE_EXT_SCRIPT_EXEC      N;&lt;br /&gt;
&lt;br /&gt;
### Define an external program to run after a scan is caught.&lt;br /&gt;
### Note that the scan source ip can be specified on the command&lt;br /&gt;
### line to the external program through the use of the &amp;quot;SRCIP&amp;quot;&lt;br /&gt;
### string (along with some appropriate switch for the program).&lt;br /&gt;
### Of course this is only useful if the external program knows&lt;br /&gt;
### what to do with this information.&lt;br /&gt;
### Example:  EXTERNAL_SCRIPT       /path/to/script --ip SRCIP -v;&lt;br /&gt;
EXTERNAL_SCRIPT             /bin/true;&lt;br /&gt;
&lt;br /&gt;
### Control execution of EXTERNAL_SCRIPT (only once per IP, or&lt;br /&gt;
### every time a scan is detected for an ip).&lt;br /&gt;
EXEC_EXT_SCRIPT_PER_ALERT   N;&lt;br /&gt;
&lt;br /&gt;
### Disk usage variables&lt;br /&gt;
DISK_CHECK_INTERVAL         300;  ### seconds&lt;br /&gt;
&lt;br /&gt;
### This can be set to 0 to disable disk checking altogether&lt;br /&gt;
DISK_MAX_PERCENTAGE         95;&lt;br /&gt;
&lt;br /&gt;
### This can be set to 0 to have psad not place any limit on the&lt;br /&gt;
### number of times it will attempt to remove data from&lt;br /&gt;
### /var/log/psad/.&lt;br /&gt;
DISK_MAX_RM_RETRIES         10;&lt;br /&gt;
&lt;br /&gt;
### Enable archiving of old scan directories at psad startup.&lt;br /&gt;
ENABLE_SCAN_ARCHIVE         N;&lt;br /&gt;
&lt;br /&gt;
### Truncate fwdata file at startup&lt;br /&gt;
TRUNCATE_FWDATA             Y;&lt;br /&gt;
&lt;br /&gt;
### Only archive scanning IP directories that have reached a danger&lt;br /&gt;
### level greater than or equal to this value.  Archiving old&lt;br /&gt;
### scanning ip directories only takes place at psad startup.&lt;br /&gt;
MIN_ARCHIVE_DANGER_LEVEL    1;&lt;br /&gt;
&lt;br /&gt;
### Email subject line config.  Change these prefixes if you want&lt;br /&gt;
### psad to generate email alerts that say something other than&lt;br /&gt;
### the following.&lt;br /&gt;
MAIL_ALERT_PREFIX           [psad-alert];&lt;br /&gt;
MAIL_STATUS_PREFIX          [psad-status];&lt;br /&gt;
MAIL_ERROR_PREFIX           [psad-error];&lt;br /&gt;
MAIL_FATAL_PREFIX           [psad-fatal];&lt;br /&gt;
&lt;br /&gt;
### URL for getting the latest psad signatures&lt;br /&gt;
SIG_UPDATE_URL              http://www.cipherdyne.org/psad/signatures;&lt;br /&gt;
&lt;br /&gt;
### These next two are psadwatchd vars&lt;br /&gt;
PSADWATCHD_CHECK_INTERVAL   5;  ### seconds&lt;br /&gt;
PSADWATCHD_MAX_RETRIES      10;&lt;br /&gt;
&lt;br /&gt;
### Directories&lt;br /&gt;
PSAD_DIR                    /var/log/psad;&lt;br /&gt;
PSAD_RUN_DIR                /var/run/psad;&lt;br /&gt;
PSAD_FIFO_DIR               /var/lib/psad;&lt;br /&gt;
PSAD_LIBS_DIR               /usr/lib/psad;&lt;br /&gt;
PSAD_CONF_DIR               /etc/psad;&lt;br /&gt;
PSAD_ERR_DIR                $PSAD_DIR/errs;&lt;br /&gt;
CONF_ARCHIVE_DIR            $PSAD_CONF_DIR/archive;&lt;br /&gt;
SCAN_DATA_ARCHIVE_DIR       $PSAD_DIR/scan_archive;&lt;br /&gt;
ANALYSIS_MODE_DIR           $PSAD_DIR/ipt_analysis;&lt;br /&gt;
SNORT_RULES_DIR             $PSAD_CONF_DIR/snort_rules;&lt;br /&gt;
&lt;br /&gt;
### Files&lt;br /&gt;
FW_DATA_FILE                $PSAD_DIR/fwdata;&lt;br /&gt;
ULOG_DATA_FILE              $PSAD_DIR/ulogd.log;&lt;br /&gt;
FW_CHECK_FILE               $PSAD_DIR/fw_check;&lt;br /&gt;
DSHIELD_EMAIL_FILE          $PSAD_DIR/dshield.email;&lt;br /&gt;
SIGS_FILE                   $PSAD_CONF_DIR/signatures;&lt;br /&gt;
ICMP_TYPES_FILE             $PSAD_CONF_DIR/icmp_types;&lt;br /&gt;
AUTO_DL_FILE                $PSAD_CONF_DIR/auto_dl;&lt;br /&gt;
SNORT_RULE_DL_FILE          $PSAD_CONF_DIR/snort_rule_dl;&lt;br /&gt;
POSF_FILE                   $PSAD_CONF_DIR/posf;&lt;br /&gt;
P0F_FILE                    $PSAD_CONF_DIR/pf.os;&lt;br /&gt;
IP_OPTS_FILE                $PSAD_CONF_DIR/ip_options;&lt;br /&gt;
PSAD_FIFO_FILE              $PSAD_FIFO_DIR/psadfifo;&lt;br /&gt;
ETC_HOSTS_DENY_FILE         /etc/hosts.deny;&lt;br /&gt;
ETC_SYSLOG_CONF             /etc/syslog.conf;&lt;br /&gt;
ETC_RSYSLOG_CONF            /etc/rsyslog.conf;&lt;br /&gt;
ETC_SYSLOGNG_CONF           /etc/syslog-ng/syslog-ng.conf;&lt;br /&gt;
ETC_METALOG_CONF            /etc/metalog/metalog.conf;&lt;br /&gt;
STATUS_OUTPUT_FILE          $PSAD_DIR/status.out;&lt;br /&gt;
ANALYSIS_OUTPUT_FILE        $PSAD_DIR/analysis.out;&lt;br /&gt;
INSTALL_LOG_FILE            $PSAD_DIR/install.log;&lt;br /&gt;
&lt;br /&gt;
### PID files&lt;br /&gt;
PSAD_PID_FILE               $PSAD_RUN_DIR/psad.pid;&lt;br /&gt;
PSAD_CMDLINE_FILE           $PSAD_RUN_DIR/psad.cmd;&lt;br /&gt;
KMSGSD_PID_FILE             $PSAD_RUN_DIR/kmsgsd.pid;&lt;br /&gt;
PSADWATCHD_PID_FILE         $PSAD_RUN_DIR/psadwatchd.pid;&lt;br /&gt;
&lt;br /&gt;
### List of ips that have been auto blocked by iptables&lt;br /&gt;
### or tcpwrappers (the auto blocking feature is disabled by&lt;br /&gt;
### default, see the psad man page and the ENABLE_AUTO_IDS&lt;br /&gt;
### variable).&lt;br /&gt;
AUTO_BLOCK_IPT_FILE         $PSAD_DIR/auto_blocked_iptables;&lt;br /&gt;
AUTO_BLOCK_TCPWR_FILE       $PSAD_DIR/auto_blocked_tcpwr;&lt;br /&gt;
&lt;br /&gt;
### File used internally by psad to add Netfilter blocking&lt;br /&gt;
### rules to a running psad process&lt;br /&gt;
AUTO_IPT_SOCK               $PSAD_RUN_DIR/auto_ipt.sock;&lt;br /&gt;
&lt;br /&gt;
FW_ERROR_LOG                $PSAD_ERR_DIR/fwerrorlog;&lt;br /&gt;
PRINT_SCAN_HASH             $PSAD_DIR/scan_hash;&lt;br /&gt;
&lt;br /&gt;
### /proc interface for controlling ip forwarding&lt;br /&gt;
PROC_FORWARD_FILE           /proc/sys/net/ipv4/ip_forward;&lt;br /&gt;
&lt;br /&gt;
### Packet counters for tcp, udp, and icmp protocols&lt;br /&gt;
PACKET_COUNTER_FILE         $PSAD_DIR/packet_ctr;&lt;br /&gt;
&lt;br /&gt;
### Top scanned ports&lt;br /&gt;
TOP_SCANNED_PORTS_FILE      $PSAD_DIR/top_ports;&lt;br /&gt;
&lt;br /&gt;
### Top signature matches&lt;br /&gt;
TOP_SIGS_FILE               $PSAD_DIR/top_sigs;&lt;br /&gt;
&lt;br /&gt;
### Top attackers&lt;br /&gt;
TOP_ATTACKERS_FILE          $PSAD_DIR/top_attackers;&lt;br /&gt;
&lt;br /&gt;
### Counter file for Dshield alerts&lt;br /&gt;
DSHIELD_COUNTER_FILE        $PSAD_DIR/dshield_ctr;&lt;br /&gt;
&lt;br /&gt;
### Counter file for iptables prefixes&lt;br /&gt;
IPT_PREFIX_COUNTER_FILE     $PSAD_DIR/ipt_prefix_ctr;&lt;br /&gt;
&lt;br /&gt;
### iptables command output and error collection files; these are&lt;br /&gt;
### used by IPTables::ChainMgr&lt;br /&gt;
IPT_OUTPUT_FILE             $PSAD_DIR/psad.iptout;&lt;br /&gt;
IPT_ERROR_FILE              $PSAD_DIR/psad.ipterr;&lt;br /&gt;
&lt;br /&gt;
### system binaries&lt;br /&gt;
iptablesCmd      /sbin/iptables;&lt;br /&gt;
shCmd            /bin/sh;&lt;br /&gt;
wgetCmd          /usr/bin/wget;&lt;br /&gt;
gzipCmd          /bin/gzip;&lt;br /&gt;
mknodCmd         /bin/mknod;&lt;br /&gt;
psCmd            /bin/ps;&lt;br /&gt;
mailCmd          /usr/bin/mail;&lt;br /&gt;
sendmailCmd      /usr/sbin/sendmail;&lt;br /&gt;
ifconfigCmd      /sbin/ifconfig;&lt;br /&gt;
killallCmd       /usr/bin/killall;&lt;br /&gt;
netstatCmd       /bin/netstat;&lt;br /&gt;
unameCmd         /bin/uname;&lt;br /&gt;
whoisCmd         /usr/bin/whois_psad;&lt;br /&gt;
dfCmd            /bin/df;&lt;br /&gt;
fwcheck_psadCmd  /usr/sbin/fwcheck_psad;&lt;br /&gt;
psadwatchdCmd    /usr/sbin/psadwatchd;&lt;br /&gt;
kmsgsdCmd        /usr/sbin/kmsgsd;&lt;br /&gt;
psadCmd          /usr/sbin/psad;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
ใน vuurmuur_conf&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
drop service any from world.inet to firewall options log,logprefix=&amp;quot;PSAD&amp;quot;&amp;lt;br&amp;gt;Chain service any from any to any options chain=&amp;quot;PSAD-AUTO-IDS&amp;quot;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;#/etc/init.d/psad restart&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''สิ่งที่แก้ไขใน psad.conf'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
FW_MSG_SEARCH vrmr: DROP;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
FW_MSG_SEARCH vrmr: REJECT;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
FW_MSG_SEARCH vrmr: DROP PSAD;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
ENABLE_AUTO_IDS Y;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AUTO_IDS_DANGER_LEVEL 1;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AUTO_BLOCK_TIMEOUT 3600;&lt;br /&gt;
&lt;br /&gt;
IPTABLES_BLOCK_METHOD Y;&lt;br /&gt;
&lt;br /&gt;
IPTABLES_AUTO_RULENUM 1;&lt;br /&gt;
&lt;br /&gt;
IPT_AUTO_CHAIN1 DROP, src, filter, PSAD-AUTO-IDS, PSAD_BLOCK_INPUT;&lt;br /&gt;
&lt;br /&gt;
IPT_AUTO_CHAIN2 DROP, dst, filter, PSAD-AUTO-IDS, PSAD_BLOCK_OUTPUT;&lt;br /&gt;
&lt;br /&gt;
IPT_AUTO_CHAIN3 DROP, both, filter, PSAD-AUTO-IDS, PSAD_BLOCK_FORWARD;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Snifer</name></author>	</entry>

	</feed>