mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-06 09:12:45 +01:00
42 lines
1.5 KiB
Plaintext
42 lines
1.5 KiB
Plaintext
{%- set URLS = salt['pillar.get']('idstools:config:urls') -%}
|
|
{%- set RULESET = salt['pillar.get']('idstools:config:ruleset') -%}
|
|
{%- set OINKCODE = salt['pillar.get']('idstools:config:oinkcode', '' ) -%}
|
|
{%- set ISAIRGAP = salt['pillar.get']('global:airgap', 'False') -%}
|
|
{%- set MANAGERIP = salt['pillar.get']('global:managerip', '') -%}
|
|
{%- set ENGINE = salt['pillar.get']('global:mdengine', '') %}
|
|
{%- if ISAIRGAP is sameas true -%}
|
|
--merged=/opt/so/rules/nids/all.rules
|
|
--local=/opt/so/rules/nids/local.rules
|
|
{%- if ENGINE == "SURICATA" %}
|
|
--local=/opt/so/rules/nids/sorules/extraction.rules
|
|
--local=/opt/so/rules/nids/sorules/filters.rules
|
|
{%- endif %}
|
|
--url=http://{{ MANAGERIP }}:7788/rules/emerging-all.rules
|
|
--disable=/opt/so/idstools/etc/disable.conf
|
|
--enable=/opt/so/idstools/etc/enable.conf
|
|
--modify=/opt/so/idstools/etc/modify.conf
|
|
{%- else -%}
|
|
--suricata-version=6.0
|
|
--merged=/opt/so/rules/nids/all.rules
|
|
--local=/opt/so/rules/nids/local.rules
|
|
{%- if ENGINE == "SURICATA" %}
|
|
--local=/opt/so/rules/nids/sorules/extraction.rules
|
|
--local=/opt/so/rules/nids/sorules/filters.rules
|
|
{%- endif %}
|
|
--disable=/opt/so/idstools/etc/disable.conf
|
|
--enable=/opt/so/idstools/etc/enable.conf
|
|
--modify=/opt/so/idstools/etc/modify.conf
|
|
{%- if RULESET == 'ETOPEN' %}
|
|
--etopen
|
|
{%- elif RULESET == 'ETPRO' %}
|
|
--etpro={{ OINKCODE }}
|
|
{%- elif RULESET == 'TALOS' %}
|
|
--url=https://www.snort.org/rules/snortrules-snapshot-29200.tar.gz?oinkcode={{ OINKCODE }}
|
|
{%- endif %}
|
|
{%- endif %}
|
|
{%- if URLS != None %}
|
|
{%- for URL in URLS %}
|
|
--url={{ URL }}
|
|
{%- endfor %}
|
|
{%- endif %}
|