# enable this option if you want to send logs to local syslog facility logging:local_syslog_logging = on # list of all your networks in CIDR format networks_list_path = /etc/networks_list # list networks in CIDR format which will be not monitored for attacks white_list_path = /etc/networks_whitelist # Enable/Disable any actions in case of attack enable_ban = on ## How many packets will be collected from attack traffic ban_details_records_count = 500 ## How long (in seconds) we should keep an IP in blocked state ## If you set 0 here it completely disables unban capability ban_time = 1900 # Check if the attack is still active, before triggering an unban callback with this option # If the attack is still active, check each run of the unban watchdog unban_only_if_attack_finished = on # enable per subnet speed meters # For each subnet, list track speed in bps and pps for both directions enable_subnet_counters = off {% if "mirror" in mode %} mirror_afpacket = on {% endif %} {% if "in" in direction %} process_incoming_traffic = on {% endif %} {% if "out" in direction %} process_outgoing_traffic = on {% endif %} {% for th in threshold %} {% if th == "fps" %} ban_for_flows = on threshold_flows = {{ threshold[th] }} {% endif %} {% if th == "mbps" %} ban_for_bandwidth = on threshold_mbps = {{ threshold[th] }} {% endif %} {% if th == "pps" %} ban_for_pps = on threshold_pps = {{ threshold[th] }} {% endif %} {% endfor %} {% if listen_interface %} {% set value = listen_interface if listen_interface is string else listen_interface | join(',') %} interfaces = {{ value }} {% endif %} {% if alert_script %} notify_script_path = {{ alert_script }} {% endif %}