Let's assume that your box is called "sensor" and your sniffing
interface is "eth1". So you should see something like this:
ls -l /etc/nsm/sensor-eth1/bpf*
lrwxrwxrwx 1 root root 8 Dec 14 20:41 bpf-bro.conf -> bpf.conf
lrwxrwxrwx 1 root root 23 Dec 14 20:41 bpf.conf -> /etc/nsm/rules/bpf.conf
lrwxrwxrwx 1 root root 8 Dec 14 20:41 bpf-ids.conf -> bpf.conf
lrwxrwxrwx 1 root root 8 Dec 14 20:41 bpf-pcap.conf -> bpf.conf
lrwxrwxrwx 1 root root 8 Dec 14 20:41 bpf-prads.conf -> bpf.conf
Notice that both bpf-ids.conf (BPF for Snort/Suricata IDS engine) and
bpf-pcap.conf (BPF for netsniff-ng full packet capture) are symlinked
to bpf.conf by default.
So if you want to specify a BPF that only applies to full packet
capture and *not* IDS alerts, you would do something like the
following:
# Delete the existing pcap symlink
sudo rm /etc/nsm/sensor-eth1/bpf-pcap.conf
# Create a regular file in its place and add your BPF using nano or
your favorite text editor
sudo nano /etc/nsm/sensor-eth1/bpf-pcap.conf
# Restart netsniff-ng to read new BPF
sudo nsm_sensor_ps-restart --only-pcap
Does that help?
> For more options, visit
https://groups.google.com/d/optout.
--
Doug Burks