In this document, we could offer detailed description of all available configuration options in all configuration namespaces
af_packet
| Name |
Type |
Default value |
Description |
| mirror_afpacket |
bool |
false |
Enable capture from mirror port using AF_PACKET capture engine |
| interfaces |
string_list |
[ ] |
Interfaces list for traffic capture |
| af_packet_extract_tunnel_traffic |
bool |
false |
Enables for af_packet code which strips external level for GRE tunnels |
| mirror_af_packet_sampling |
bool |
true |
Enables sampling for mirror mode offloaded on kernel / driver level |
| mirror_af_external_packet_sampling |
bool |
false |
Enables external sampling for mirror mode when router or switch does sampling |
| mirror_af_packet_socket_stats |
bool |
true |
Enables capture socket performance statistics |
| mirror_af_packet_disable_multithreading |
bool |
true |
Disables multi thread processing and handles all traffic using single thread |
| mirror_af_packet_fanout_mode |
string |
"cpu" |
Fanout mode. Algorithm to spread load over threads |
| mirror_af_packet_sampling_rate |
positive_integer_with_zero |
100 |
Sampling rate for AF_PACKET |
| mirror_external_af_packet_sampling_rate |
positive_integer_with_zero |
100 |
External sampling rate for AF_PACKET |
| mirror_af_packet_workers_number_override |
bool |
false |
Enables logic to explicitly override number of worker processes |
| mirror_af_packet_workers_number |
positive_integer_with_zero |
1 |
Specifies how many worker processes we need for each interface |
| afpacket_strict_cpu_affinity |
bool |
false |
Enables strict CPU affinity and binds traffic capture threads to fixed logical CPUs |
| af_packet_read_packet_length_from_ip_header |
bool |
false |
By default, FastNetMon reads packet length from the wire. But it can use information from IP header when you enable this option |
ban_management
| Name |
Type |
Default value |
Description |
| enable_ban |
bool |
false |
Completely enable or disable all ban actions |
| enable_ban_hostgroup |
bool |
false |
Completely enable or disable all ban for total traffic per hostgroup |
| enable_ban_remote_outgoing |
bool |
false |
Enable blocking for remote hosts in outgoing direction |
| enable_ban_remote_incoming |
bool |
false |
Enable blocking for remote hosts in incoming direction |
| do_not_ban_incoming |
bool |
false |
Completely disables ban for incoming traffic |
| do_not_ban_outgoing |
bool |
false |
Completely disables ban for outgoing traffic |
| per_direction_hostgroup_thresholds |
bool |
true |
Changes hostgroup thresholds to be per direction. Default becomes incoming |
| flexible_thresholds |
bool |
false |
Enables flexible thresholds logic |
| flexible_thresholds_disable_multi_alerts |
bool |
false |
Enables compatibility mode for flexible threshold which triggers attack only using single threshold and only in single direction |
| keep_flow_spec_announces_during_restart |
bool |
false |
Saves list of flow spec announces on shutdown and restores it on startup |
| keep_blocked_hosts_during_restart |
bool |
false |
Saves list of blocked hosts on shutdown and restores it on startup |
| keep_blocked_hostgroups_during_restart |
bool |
false |
Saves list of blocked hostgroups on shutdown and restores it on startup |
| enable_ban_ipv6 |
bool |
false |
Completely enable or disable all ban actions for IPv6 traffic |
| unban_enabled |
bool |
true |
We will try to unban blocked IPs after this time expires |
| ban_status_updates |
bool |
false |
FastNetMon will report active attacks every X seconds |
| ban_status_delay |
positive_integer_with_zero |
20 |
How often FastNetMon will update external systems about active attacks |
| ban_time |
positive_integer_with_zero |
771 |
How long we should keep an IP in blocked state. Zero value is prohibited here. |
| unban_only_if_attack_finished |
bool |
true |
Check if the attack is still active, before triggering an unblock callback with this option. If the attack is still active, check each run of the unblock watchdog |
| gobgp_flow_spec_announces |
bool |
false |
Announce flow spec rules to block only malicious traffic. Use only if you have BGP Flowspec capable routers |
| gobgp_flow_spec_v6_announces |
bool |
false |
Announce flow spec IPv6 rules to block only malicious traffic. Use only if you have BGP Flowspec capable routers |
| flow_spec_unban_enabled |
bool |
true |
We will try to withdraw flow spec rule when blocking time expires |
| flow_spec_per_hostgroup_management |
bool |
false |
Enables logic which enables flow spec mitigations only when they explicitly enabled for hostgroup |
| flow_spec_ban_time |
positive_integer_with_zero |
1900 |
How long we should flow spec keep rule in announces. Zero value is prohibited here. |
| collect_attack_pcap_dumps |
bool |
false |
This option enables pcap collection for attack's traffic dump. Works only for mirror and sFlow modes |
| collect_simple_attack_dumps |
bool |
true |
Collect simple attack dumps which include information from attack's sample. Works for all capture engines |
| ban_details_records_count |
positive_integer_with_zero |
25 |
How many packets will be collected from attack's traffic. Please decrease this value if you are using sampled capture protocols |
| threshold_specific_ban_details |
bool |
false |
In this mode FastNetMon will collect only traffic relevant to direction and type of threshold |
| do_not_cap_ban_details_records_count |
bool |
false |
Disables logic which automatically reduces ban_details_records_count when it exceeds 100 for sFlow and Netflow |
| unban_total_hostgroup_enabled |
bool |
true |
We will try to unban blocked hostgroup after specified amount of time |
| ban_time_total_hostgroup |
positive_integer_with_zero |
675 |
How long we should keep hostgroup in blocked state. Zero value is prohibited here. |
| bucket_traffic_collection_timeout |
positive_integer_with_zero |
60 |
How long we should wait for bucket to collect traffic after threshold was crossed |
bgp
| Name |
Type |
Default value |
Description |
| gobgp |
bool |
false |
Enable BGP daemon integration |
| gobgp_api_host |
string |
"localhost" |
IP address or host to connect to GoBGP |
| gobgp_api_port |
numeric_ipv4_port |
50051 |
Port to connect to GoBGP |
| gobgp_bgp_listen_port |
numeric_ipv4_port |
179 |
BGP listen port |
| gobgp_router_id |
string |
"" |
Router ID to override default configuration |
| gobgp_next_hop |
numeric_ipv4_host |
"0.0.0.0" |
Next hop value for BGP unicast host and subnet IPv4 announces |
| gobgp_next_hop_host_ipv4 |
numeric_ipv4_host |
"0.0.0.0" |
Next hop value for BGP unicast IPv4 host announces |
| gobgp_next_hop_subnet_ipv4 |
numeric_ipv4_host |
"0.0.0.0" |
Next hop value for BGP unicast IPv4 subnet announces |
| gobgp_next_hop_remote_host |
numeric_ipv4_host |
"0.0.0.0" |
Next hop value for BGP unicast remote host IPv4 announces |
| gobgp_do_not_manage_daemon |
bool |
false |
Disables automatic start / restart operations for BGP daemon |
| gobgp_announce_host |
bool |
true |
Announce /32 host itself with BGP |
| gobgp_announce_whole_subnet |
bool |
false |
Announce origin subnet of IP address |
| gobgp_announce_whole_subnet_force_custom_prefix_length |
bool |
false |
Enables override for subnet announce |
| gobgp_announce_whole_subnet_custom_prefix_length |
positive_integer_with_zero |
24 |
Prefix length to override default one |
| gobgp_announce_whole_subnet_force_custom_ipv6_prefix_length |
bool |
false |
Enables override for IPv6 subnet announce |
| gobgp_announce_whole_subnet_custom_ipv6_prefix_length |
positive_integer_with_zero |
48 |
IPv6 prefix length to override default one |
| gobgp_announce_remote_host |
bool |
false |
Announce remote /32 host itself with BGP |
| gobgp_community_host |
string |
"65001:668" |
BGP community for outgoing host announces. Here you can add community string for the host announce. Usage ASN:Community. ASN and community should be from 1 to 65535). |
| gobgp_communities_host_ipv4 |
string_list |
[ ] |
BGP communities for outgoing host announces. Here you can add communities strings for the host announces. Usage ASN:Community. ASN and community should be from 1 to 65535). |
| gobgp_communities_host_ipv6 |
string_list |
[ ] |
BGP communities for outgoing host announces. Here you can add communities strings for the host announces. Usage ASN:Community. ASN and community should be from 1 to 65535). |
| gobgp_community_subnet |
string |
"65001:667" |
BGP community for outgoing subnet announces. Here you can add community string for the prefix subnet announce. Usage ASN:Community. ASN and community should be from 1 to 65535). |
| gobgp_communities_subnet_ipv4 |
string_list |
[ ] |
BGP communities for outgoing subnet announces. Here you can add communities strings for the prefix subnet announce. Usage ASN:Community. ASN and community should be from 1 to 65535). |
| gobgp_communities_subnet_ipv6 |
string_list |
[ ] |
BGP communities for outgoing subnet announces. Here you can add communities strings for the prefix subnet announce. Usage ASN:Community. ASN and community should be from 1 to 65535). |
| gobgp_community_remote_host |
string |
"65001:669" |
BGP community for outgoing remote host announces. Here you can add community string for the host announce. Usage ASN:Community. ASN and community should be from 1 to 65535). |
| gobgp_ipv6 |
bool |
false |
Enable BGP actions for IPv6 traffic |
| gobgp_next_hop_ipv6 |
string |
"100::1" |
Next hop value for BGP unicast IPv6 announces |
| gobgp_announce_host_ipv6 |
bool |
true |
Announce /128 host itself with BGP |
| gobgp_announce_whole_subnet_ipv6 |
bool |
false |
IPv6 prefix subnet, that will be announced |
| gobgp_community_host_ipv6 |
string |
"65001:668" |
BGP community for outgoing host announces for IPv6 protocol. Here you can add community string for the host announce. Usage ASN:Community. ASN and community should be from 1 to 65535). |
| gobgp_community_subnet_ipv6 |
string |
"65001:667" |
BGP community for outgoing subnet announces for IPv6 protocol. Here you can add community string for the prefix subnet announce. Usage ASN:Community. ASN and community should be from 1 to 65535). |
| gobgp_flow_spec_default_action |
string |
"discard" |
Default action for flow spec rules. You could specify accept, discard or rate-limit here |
| gobgp_flow_spec_next_hop_ipv4 |
string_list |
[ ] |
List of IPv4 next hops |
| gobgp_flow_spec_next_hop_ipv6 |
string_list |
[ ] |
List of IPv6 next hops |
| gobgp_flow_spec_v6_default_action |
string |
"discard" |
Default action for flow spec rules. You could specify accept, discard or rate-limit here |
| gobgp_flow_spec_v6_rate_limit_value |
positive_integer_with_zero |
1024 |
For rate-limit action you could specify rate |
| gobgp_flow_spec_rate_limit_value |
positive_integer_with_zero |
1024 |
For rate-limit action you could specify rate |
| flow_spec_tcp_options_use_match_bit |
bool |
false |
Enables force match bit in outgoing BGP Flow Spec announces about TCP flags |
| flow_spec_fragmentation_options_use_match_bit |
bool |
false |
Enables force match bit in outgoing BGP Flow Spec announces about fragmentation |
| flow_spec_do_not_process_length_field |
bool |
false |
Disables processing for length field completely. Use it if your device produces incorrect information about packet's length |
| flow_spec_do_not_process_tcp_flags_field |
bool |
false |
Disables processing for TCP flags field completely. You may need it if your router does not support all TCP flags in flow spec rules |
| flow_spec_do_not_process_ip_fragmentation_flags_field |
bool |
false |
Disables processing for IP fragmentation field completely. You may need it if your router does not support all IP fragmentations flags in flow spec rules |
| flow_spec_ignore_do_not_fragment_flag |
bool |
false |
Disables processing for do not fragment field completely. It's useful on Arista and Extreme |
| flow_spec_do_not_process_source_address_field |
bool |
false |
Disables processing for source address field completely. Use it if you experience attacks from big number of IP addresses |
| flow_spec_execute_validation |
bool |
true |
With this option we check that source and destination addresses in flow spec rule specified from fcli or web API belongs to our ranges |
| do_not_withdraw_unicast_announces_on_restart |
bool |
false |
Disables automatic withdrawal of BGP Unicast announces |
| do_not_withdraw_flow_spec_announces_on_restart |
bool |
false |
Disables automatic withdrawal of BGP Flow Spec announces |
| gobgp_announce_hostgroup_networks |
bool |
false |
Enable BGP announces for any network from specific hostgroup when per hostgroup aka total thresholds in use |
| gobgp_announce_hostgroup_networks_ipv4 |
bool |
false |
Enable BGP announces for all IPv4 networks from specific hostgroup when per hostgroup aka total thresholds in use |
| gobgp_announce_hostgroup_networks_ipv6 |
bool |
false |
Enable BGP announces for all IPv6 networks from specific hostgroup when per hostgroup aka total thresholds in use |
| gobgp_next_hop_hostgroup_networks_ipv4 |
string |
"0.0.0.0" |
Next hop for IPv4 per hostgroup network announces |
| gobgp_next_hop_hostgroup_networks_ipv6 |
string |
"100::1" |
Next hop for IPv6 per hostgroup network announces |
| gobgp_communities_hostgroup_networks_ipv4 |
string_list |
[ ] |
BGP communities for IPv4 hostgroup network announces. Here you can add communities strings for the host announces. Usage ASN:Community. ASN and community should be from 1 to 65535). |
| gobgp_communities_hostgroup_networks_ipv6 |
string_list |
[ ] |
BGP communities for IPv6 hostgroup network announces. Here you can add communities strings for the host announces. Usage ASN:Community. ASN and community should be from 1 to 65535). |
email_notification
| Name |
Type |
Default value |
Description |
| email_notifications_enabled |
bool |
false |
Enable email notifications |
| email_notifications_disable_certificate_checks |
bool |
false |
Disables TLS certificate validation completely |
| email_notifications_host |
string |
"smtp.gmail.com" |
Hostname of SMTP server |
| email_notifications_port |
numeric_ipv4_port |
587 |
Port of SMTP server used for email notifications |
| email_notifications_tls |
bool |
true |
Enable TLS for your SMTP server |
| email_notifications_auth |
bool |
true |
Enable auth for your SMTP server |
| email_notifications_auth_method |
string |
"" |
Auth method for SMTP authorization. Used only when auth enabled |
| email_notifications_username |
string |
"fastnetmon@yourdomain.com" |
Username for SMTP authorization |
| email_notifications_password |
string |
"super-secret-password" |
Password for SMTP authorization |
| email_notifications_from |
string |
"fastnetmon@yourdomain.com" |
Email address for FROM field |
| email_notifications_recipients |
string_list |
[ ] |
Email notification recipients |
| email_notifications_hide_flow_spec_rules |
bool |
false |
Hide flow spec rules from email |
| email_notifications_add_simple_packet_dump |
bool |
true |
Add simple packet dump to email |
| email_subject_blackhole_block |
string |
"FastNetMon blocked host {{ ip }}" |
Subject template for email notification about blocked host |
| email_subject_blackhole_unblock |
string |
"FastNetMon unblocked host {{ ip }}" |
Subject template for email notification about unblocked host |
| email_subject_partial_block |
string |
"FastNetMon partially blocked traffic for host {{ ip }}" |
Subject template for email notification about partially blocked host |
| email_subject_partial_unblock |
string |
"FastNetMon partially unblocked traffic for host {{ ip }}" |
Subject template for email notification about partially unblocked host |
| slack_notifications_add_simple_packet_dump |
bool |
true |
Add simple packet dump to Slack alerts |
influxdb
| Name |
Type |
Default value |
Description |
| influxdb_kafka |
bool |
false |
Enables traffic metrics export to Influxdb over Kafka |
| influxdb_kafka_brokers |
string_list |
[ ] |
Kafka brokers for InfluxDB export |
| influxdb_kafka_topic |
string |
"fastnetmon" |
Topic name for Kafka InfluxDB instance |
| influxdb_kafka_partitioner |
string |
"consistent" |
Partitioner between available partitions |
| influxdb |
bool |
false |
Enabled traffic metrics export to Influxdb |
| influxdb_database |
string |
"fastnetmon" |
Database for InfluxDB data |
| influxdb_host |
string |
"127.0.0.1" |
InfluxDB server address (IPv4, IPv6 address or domain name) |
| influxdb_port |
numeric_ipv4_port |
8086 |
InfluxDB server port |
| influxdb_custom_tags |
bool |
false |
Adds custom tag to InfluxDB export data |
| influxdb_tag_name |
string |
"node" |
Custom tag name |
| influxdb_tag_value |
string |
"master" |
Custom tag value |
| influxdb_tags_table |
string_string_map |
|
Custom tags in key / value format |
| influxdb_skip_host_counters |
bool |
false |
Skip export for host counters to reduce load on InfluxDB server |
| influxdb_push_host_ipv6_counters |
bool |
true |
Enable pushing per host IPv6 counters to InfluxDB |
| influxdb_push_host_ipv4_flexible_counters |
bool |
true |
Enables export of flexible per host IPv4 counters to InfluxDB |
| influxdb_push_host_ipv6_flexible_counters |
bool |
true |
Enables export of flexible per host IPv6 counters to InfluxDB |
| influxdb_user |
string |
"fastnetmon" |
Username for InfluxDB |
| influxdb_password |
string |
"fastnetmon" |
Password for InfluxDB |
| influxdb_auth |
bool |
false |
Enable authorization for InfluxDB |
| influxdb_attack_notification |
bool |
false |
Enables attack notifications in Grafana |
| influxdb_push_period |
positive_integer_with_zero |
1 |
Delay for run InfluxDB push thread |
netflow
| Name |
Type |
Default value |
Description |
| netflow |
bool |
false |
Enable Netflow capture. We support Netflow v5, v9 and IPFIX (10) |
| netflow_count_packets_per_device |
bool |
false |
Enable logic to count number of packets from each router |
| netflow_multi_thread_processing |
bool |
false |
Enables multi thread processing for each Netflow port |
| netflow_threads_per_port |
positive_integer_with_zero |
1 |
Number of threads per Netflow port |
| netflow_multi_thread_mode |
string |
"" |
Mode used to distribute traffic between threads |
| netflow_ports |
numeric_ipv4_port_list |
[ ] |
Netflow collector port. It's possible to specify multiple ports here |
| netflow_host |
string |
"0.0.0.0" |
Netflow collector host. To bind on all interfaces for IPv4 and IPv6 use ::. To bind only on IPv4 use 0.0.0.0. To bind on localhost for IPv4 and IPv6 use ::1. To bind only on IPv4 use 127.0.0.1 |
| netflow_socket_read_mode |
string |
"recvfrom" |
Switches logic used to read data from socket: recvfrom or recvmsg |
| netflow_rx_queue_overflow_monitoring |
bool |
false |
Switches on logic to monitor drops on socket |
| netflow_ignore_sampling_rate_from_device |
bool |
false |
Ignores sampling rate announces from device. For Netflow v9 and IPFIX only |
| netflow_ignore_long_duration_flow_enable |
bool |
false |
FastNetMon will ignore flows which exceed duration specified in configuration |
| netflow_long_duration_flow_limit |
positive_integer_with_zero |
1 |
FastNetMon will ignore flows which exceed duration specified in this option |
| netflow_v5_per_router_sampling_rate |
string_positive_integer_with_zero_map |
|
Custom Netflow v5 sampling rate on router basis |
| netflow_v9_per_router_sampling_rate |
string_positive_integer_with_zero_map |
|
Custom Netflow v9 sampling rate on router basis |
| netflow_v9_read_sampling_rate_in_data_section |
bool |
false |
Enables logic which can retrieve sampling rate when it was passed in data section. Mikrotik uses this approach |
| netflow_v9_extract_tunnel_traffic |
bool |
false |
Enables logic for Netflow v9 code which strips external level for GRE tunnels. It works only when packet header information is present |
| ipfix_per_router_sampling_rate |
string_positive_integer_with_zero_map |
|
Custom IPFIX sampling rate on router basis |
| ipfix_extract_tunnel_traffic |
bool |
false |
Enables logic for IPFIX code which strips external level for GRE tunnels. It works only when packet header information is present |
| netflow_sampling_ratio |
positive_integer_with_zero |
1 |
Netflow 9 or IPFIX sampling rate used at agent side. Netflow v9 and IPFIX agents use different and very complex approaches for notifying about sample ratio. Here you could specify a sampling ratio for all this agents. For Netflow v5 we extract sampling ratio from packets directly and this option not used. |
| netflow_v5_custom_sampling_ratio_enable |
bool |
false |
This option will override netflow v5 sampling rate from packets by specified value |
| netflow_v5_sampling_ratio |
positive_integer_with_zero |
1 |
It will be used when netflow_v5_custom_sampling_ratio_enable set to enable |
| netflow_templates_cache |
bool |
true |
Cache Netflow v9 or IPFIX data templates on disk |
| netflow_sampling_cache |
bool |
true |
Cache Netflow v9 and IPFIX sampling rates on disk |
| netflow_process_only_flows_with_dropped_packets |
bool |
false |
We will process only Netflow v9 or IPFIX with forwarding status set to dropped |
| netflow_mark_zero_next_hop_and_zero_output_as_dropped |
bool |
false |
With this option all traffic with zero IPv4 and IPv6 addresses in next hop and zero output interface will be marked as dropped |
traffic_calculation_management
| Name |
Type |
Default value |
Description |
| keep_traffic_counters_during_restart |
bool |
false |
Keep all speed counters during restarts |
| process_incoming_traffic |
bool |
true |
Enables or disables processing for incoming traffic |
| process_outgoing_traffic |
bool |
true |
Enables or disables processing for outgoing traffic |
| override_internal_traffic_as_incoming |
bool |
false |
Enables logic to process internal traffic as incoming |
| override_internal_traffic_as_outgoing |
bool |
false |
Enables logic to process internal traffic as outgoing |
| process_ipv6_traffic |
bool |
true |
Enables processing for IPv6 traffic |
| enable_connection_tracking |
bool |
true |
Enable traffic state tracking. If you interested in flow per second rates, please enable it. Be careful, it may increase CPU usage significantly |
| remote_host_tracking |
bool |
false |
Completely enable or disable bandwidth calculation for remote hosts |
| connection_tracking_skip_ports |
bool |
false |
Disables port processing for connection tracking |
| enable_total_hostgroup_counters |
bool |
true |
Enable traffic counters for total per hostgroups traffic |
| enable_interface_counters |
bool |
true |
Enable interface counters for per interface traffic |
| enable_asn_counters |
bool |
true |
Enable ASN counters for per ASN traffic |
| build_total_hostgroups_from_per_host_hostgroups |
bool |
false |
Allows using per-host hostgroups for building total hostgroups |
| dump_other_traffic |
bool |
false |
Dump all traffic which belongs to other class to log. Only for debugging reasons. It significantly degrades performance |
| dump_internal_traffic |
bool |
false |
Dump all traffic which belongs to internal class to log. Only for debugging reasons. It significantly degrades performance |
| dump_all_traffic |
bool |
false |
Dump all traffic to log. Only for debugging reasons. It significantly degrades performance |
| dump_all_traffic_json |
bool |
false |
Dump all traffic to log in JSON format. Only for debugging reasons. It significantly degrades performance |
| speed_calculation_delay |
positive_integer_with_zero |
1 |
This value control how often we run speed recalculation function. Please do not use this unless support suggested this to you |
| average_calculation_time |
positive_integer_with_zero |
5 |
We use average values for traffic speed to certain IP and calculates average over this time slice |
| flow_forwarder |
bool |
false |
Flow forwarder allows you to send traffic to remote FastNetMon |
| flow_forwarder_remote_addresses |
string_list |
[ ] |
Flow forwarder allows you to send traffic to remote FastNetMon: protocol://host:port as protocol you can use udp or tcp |
| flow_forwarder_sampling_rate |
positive_integer_with_zero |
512 |
Sampling rate for mirrored traffic for Flow Forwarder export |
| ipv6_automatic_data_cleanup |
bool |
true |
Enables logic which removes old entries from IPv6 data counters |
| ipv6_automatic_data_cleanup_threshold |
positive_integer_with_zero |
300 |
We will remove all entries which exceed this age in seconds |
| ipv6_automatic_data_cleanup_delay |
positive_integer_with_zero |
300 |
How often we will run cleanup logic |
| ipv4_automatic_data_cleanup |
bool |
true |
Enables logic which removes old entries from IPv4 data counters |
| ipv4_automatic_data_cleanup_threshold |
positive_integer_with_zero |
300 |
We will remove all entries which exceed this age in seconds |
| ipv4_automatic_data_cleanup_delay |
positive_integer_with_zero |
300 |
How often we will run cleanup logic |
| ipv4_remote_automatic_data_cleanup |
bool |
true |
Enables logic which removes old entries from IPv4 remote data counters |
| ipv4_remote_automatic_data_cleanup_threshold |
positive_integer_with_zero |
300 |
We will remove all remove IPv4 entries which exceed this age in seconds |
| ipv4_remote_automatic_data_cleanup_delay |
positive_integer_with_zero |
300 |
How often we will run cleanup logic for remote IPv4 records |
| traffic_buffer |
bool |
false |
Enables or disables traffic buffer which keeps some amount of previously processed packets |
| traffic_buffer_size |
positive_integer_with_zero |
100000 |
Specifies number of elements in traffic_buffer for 1 second of average calculation time |
| traffic_buffer_port_mirror |
bool |
false |
Enables or disables traffic buffer for port mirror modes. Do not enable unless sampling is enabled |
| generate_attack_traffic_samples |
bool |
false |
Enables logic to populate statistical reports about attacks traffic. Only for vendor integrations |
| generate_attack_traffic_samples_delay |
positive_integer_with_zero |
60 |
How often we're going to produce traffic reports about active attacks |
| generate_max_talkers_report |
bool |
false |
Enables logic to track max talkers and store them into MongoDB Only for vendor integrations |
| generate_max_talkers_report_delay |
positive_integer_with_zero |
300 |
How often we're going to produce reports about max talkers |
| generate_hostgroup_traffic_samples |
bool |
false |
Enables logic to populate statistical reports about hostgroup traffic. Only for vendor integrations |
| generate_hostgroup_traffic_samples_delay |
positive_integer_with_zero |
60 |
How often we're going to produce traffic reports for hostgroup traffic |
default
| Name |
Type |
Default value |
Description |
| name |
string |
"global" |
Name of host group |
| parent_name |
string |
"" |
Parent host group name |
| description |
string |
"This is default group for all hosts" |
Human-friendly name for this group |
| calculation_method |
string |
"per_host" |
Traffic calculation method for host group: total or per_host (or empty value) |
| networks |
cidr_networks_list |
[ ] |
List of networks which belong to this group |
| enable_ban |
bool |
false |
Enable ban actions for hosts in this group |
| ban_for_pps |
bool |
false |
Should we block host in this group if it exceeds packet per second threshold? |
| ban_for_bandwidth |
bool |
false |
Should we block host in this group if it exceeds bandwidth threshold? |
| ban_for_flows |
bool |
false |
Should we block host in this group if it exceeds flows threshold? |
| threshold_pps |
positive_integer_with_zero |
100000 |
Packet per second traffic to/from this host should exceed this value |
| threshold_mbps |
positive_integer_with_zero |
1000 |
Bandwidth to/from this host should exceed this value |
| threshold_flows |
positive_integer_with_zero |
3500 |
Flow per second speed to/from this host should exceed this value |
| ban_for_tcp_bandwidth |
bool |
false |
Block hosts in group for TCP bandwidth threshold? |
| ban_for_udp_bandwidth |
bool |
false |
Block hosts in group for UDP bandwidth threshold? |
| ban_for_icmp_bandwidth |
bool |
false |
Block hosts in group for ICMP bandwidth threshold? |
| ban_for_tcp_pps |
bool |
false |
Should we block host in this group if it exceeds packet per second threshold for TCP? |
| ban_for_udp_pps |
bool |
false |
Should we block host in this group if it exceeds packet per second threshold for UDP? |
| ban_for_icmp_pps |
bool |
false |
Should we block host in this group if it exceeds packet per second threshold for ICMP? |
| threshold_tcp_mbps |
positive_integer_with_zero |
1000 |
TCP bandwidth to/from this host should exceed this value |
| threshold_udp_mbps |
positive_integer_with_zero |
1000 |
UDP bandwidth to/from this host should exceed this value |
| threshold_icmp_mbps |
positive_integer_with_zero |
1000 |
ICMP bandwidth to/from this host should exceed this value |
| threshold_tcp_pps |
positive_integer_with_zero |
100000 |
TCP packet per second traffic to/from this host should exceed this value |
| threshold_udp_pps |
positive_integer_with_zero |
100000 |
UDP packet per second traffic to/from this host should exceed this value |
| threshold_icmp_pps |
positive_integer_with_zero |
100000 |
ICMP packet per second traffic to/from this host should exceed this value |
| ban_for_tcp_syn_pps |
bool |
false |
Block hosts in group for TCP SYN packets per second threshold |
| threshold_tcp_syn_pps |
positive_integer_with_zero |
1000 |
TCP SYN pps to/from this host should exceed this value |
| ban_for_tcp_syn_bandwidth |
bool |
false |
Block hosts in group for TCP SYN packets per second threshold |
| threshold_tcp_syn_mbps |
positive_integer_with_zero |
1000 |
TCP SYN bandwidth to/from this host should exceed this value |
| ban_for_ip_fragments_pps |
bool |
false |
Block hosts in group for fragmented IP packets per second threshold |
| threshold_ip_fragments_pps |
positive_integer_with_zero |
1000 |
Fragmented IP pps to/from this host should exceed this value |
| ban_for_ip_fragments_bandwidth |
bool |
false |
Block hosts in group for fragmented IP packets per second threshold |
| threshold_ip_fragments_mbps |
positive_integer_with_zero |
1000 |
fragmented IP bandwidth to/from this host should exceed this value |
| enable_ban_incoming |
bool |
false |
Enable ban actions for this group for incoming traffic |
| enable_ban_outgoing |
bool |
false |
Enable ban actions for this group for incooutgoingming traffic |
| enable_bgp_flow_spec |
bool |
false |
Enable BGP Flow Spec for this hostgroup |
| ban_for_pps_outgoing |
bool |
false |
Should we block host in this group if it exceeds packet per second threshold? |
| ban_for_bandwidth_outgoing |
bool |
false |
Should we block host in this group if it exceeds bandwidth threshold? |
| ban_for_flows_outgoing |
bool |
false |
Should we block host in this group if it exceeds flows threshold? |
| threshold_pps_outgoing |
positive_integer_with_zero |
100000 |
Packet per second traffic to/from this host should exceed this value |
| threshold_mbps_outgoing |
positive_integer_with_zero |
1000 |
Bandwidth to/from this host should exceed this value |
| threshold_flows_outgoing |
positive_integer_with_zero |
3500 |
Flow per second speed to/from this host should exceed this value |
| ban_for_tcp_bandwidth_outgoing |
bool |
false |
Block hosts in group for TCP bandwidth threshold? |
| ban_for_udp_bandwidth_outgoing |
bool |
false |
Block hosts in group for UDP bandwidth threshold? |
| ban_for_icmp_bandwidth_outgoing |
bool |
false |
Block hosts in group for ICMP bandwidth threshold? |
| ban_for_tcp_pps_outgoing |
bool |
false |
Should we block host in this group if it exceeds packet per second threshold for TCP? |
| ban_for_udp_pps_outgoing |
bool |
false |
Should we block host in this group if it exceeds packet per second threshold for UDP? |
| ban_for_icmp_pps_outgoing |
bool |
false |
Should we block host in this group if it exceeds packet per second threshold for ICMP? |
| threshold_tcp_mbps_outgoing |
positive_integer_with_zero |
1000 |
TCP bandwidth to/from this host should exceed this value |
| threshold_udp_mbps_outgoing |
positive_integer_with_zero |
1000 |
UDP bandwidth to/from this host should exceed this value |
| threshold_icmp_mbps_outgoing |
positive_integer_with_zero |
1000 |
ICMP bandwidth to/from this host should exceed this value |
| threshold_tcp_pps_outgoing |
positive_integer_with_zero |
100000 |
TCP packet per second traffic to/from this host should exceed this value |
| threshold_udp_pps_outgoing |
positive_integer_with_zero |
100000 |
UDP packet per second traffic to/from this host should exceed this value |
| threshold_icmp_pps_outgoing |
positive_integer_with_zero |
100000 |
ICMP packet per second traffic to/from this host should exceed this value |
| ban_for_tcp_syn_pps_outgoing |
bool |
false |
Block hosts in group for TCP SYN packets per second threshold |
| threshold_tcp_syn_pps_outgoing |
positive_integer_with_zero |
1000 |
TCP SYN pps to/from this host should exceed this value |
| ban_for_tcp_syn_bandwidth_outgoing |
bool |
false |
Block hosts in group for TCP SYN packets per second threshold |
| threshold_tcp_syn_mbps_outgoing |
positive_integer_with_zero |
1000 |
TCP SYN bandwidth to/from this host should exceed this value |
| ban_for_ip_fragments_pps_outgoing |
bool |
false |
Block hosts in group for fragmented IP packets per second threshold |
| threshold_ip_fragments_pps_outgoing |
positive_integer_with_zero |
1000 |
Fragmented IP pps to/from this host should exceed this value |
| ban_for_ip_fragments_bandwidth_outgoing |
bool |
false |
Block hosts in group for fragmented IP packets per second threshold |
| threshold_ip_fragments_mbps_outgoing |
positive_integer_with_zero |
1000 |
fragmented IP bandwidth to/from this host should exceed this value |
| flexible_thresholds |
flexible_thresholds |
"{}" |
Flexible thresholds |