Listing 2. A Sample snort.conf File # Step #0: Set global options: config logdir: /var/log/snort # Step #1: Set the network variables: var HOME_NET 192.168.1.0/24 var EXTERNAL_NET any var SMTP $HOME_NET var HTTP_SERVERS $HOME_NET var SQL_SERVERS $HOME_NET var DNS_SERVERS 192.168.1.250/32 var RULE_PATH ./ # Step #2: Configure preprocessors preprocessor frag2 preprocessor stream4: detect_scans preprocessor stream4_reassemble preprocessor portscan: $HOME_NET 4 3 portscan.log # Step #3: Configure output plugins output database: log, mysql, user=root dbname=snort host=localhost # Step #4: Customize your rule set # Here's a rule: alert tcp $HOME_NET 7161 -> $EXTERNAL_NET any (msg:"MISC Cisco Catalyst Remote Access"; flags:SA; reference:arachnids,129; reference:cve,CVE-1999-0430; classtype:bad-unknown; sid:513; rev:1;) # And here are the paths to text files containing additional rules: include $RULE_PATH/bad-traffic.rules include $RULE_PATH/exploit.rules include $RULE_PATH/scan.rules include $RULE_PATH/finger.rules include $RULE_PATH/ftp.rules # (etc. ...)