9
|
1 threshold 550;
|
3
|
2
|
27
|
3 add_command "/sbin/iptables -I INPUT --src %s --jump DROP";
|
|
4 remove_command "/sbin/iptables -D INPUT --src %s --jump DROP";
|
|
5
|
3
|
6 ignore {
|
|
7 127.0.0.0/8; // localhost
|
1
|
8 };
|
|
9
|
20
|
10 // file "/var/log/cisco.log" {
|
|
11 // pattern "Internet_Firewall denied (tcp|udp) ([^(]*)" {
|
|
12 // index 2; // zero based
|
|
13 // bucket 200;
|
|
14 // };
|
|
15 // };
|
3
|
16
|
5
|
17 file "/var/log/secure" {
|
|
18 pattern "sshd.*Failed password .* from ::ffff:(.*) port" {
|
|
19 index 1; // zero based
|
9
|
20 bucket 400;
|
5
|
21 };
|
|
22 pattern "sshd.*Failed password .* from (.*) port" {
|
|
23 index 1; // zero based
|
9
|
24 bucket 400;
|
5
|
25 };
|
|
26 };
|
|
27
|
20
|
28 file "/var/log/httpd/access_log" {
|
|
29 pattern "(.*) - - .* /cgi-bin" {
|
|
30 index 1; // zero based
|
|
31 bucket 400;
|
|
32 };
|
|
33 pattern "(.*) - - .*/index2.php" {
|
|
34 index 1; // zero based
|
|
35 bucket 400;
|
|
36 };
|
|
37 pattern "(.*) - - .*/main.php" {
|
|
38 index 1; // zero based
|
|
39 bucket 400;
|
|
40 };
|
|
41 };
|
|
42
|
9
|
43 // file "/var/log/messages" {
|
|
44 // pattern "sshd.pam_unix.*authentication failure.*rhost=(.*) user=" {
|
|
45 // index 1; // zero based
|
|
46 // bucket 300;
|
|
47 // };
|
|
48 // pattern "sshd.pam_unix.*authentication failure.*rhost=(.*)$" {
|
|
49 // index 1; // zero based
|
|
50 // bucket 300;
|
|
51 // };
|
|
52 // };
|