Snort mailing list archives
Re: High PatMatch
From: rmkml <rmkml () yahoo fr>
Date: Wed, 19 Oct 2011 11:01:34 +0200 (CEST)
Hi eltra1n, Can you try with this bpf filter please?: 'tcp[2:2] > 1023' http://www.hsc.fr/ressources/breves/expr-bpf.html Sorry it's in French speaking. Regards Rmkml On Tue, 18 Oct 2011, eltra1n wrote:
I'm trying to reduce my high PatMatch percentage, which is at about 100%. According to the manual, I need to reduce the amount of traffic that is reassembled. I analyzed flow data and it appears that most traffic is high port to high port. I would like to ignore this using either "ignore ports" or BPF filters. Before I go down the BPF path, is there any way to do it with "ignore_ports"? It looks like you can only list each port. Any way to do 1024-65535?
------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2d-oct _______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users Please visit http://blog.snort.org to stay current on all the latest Snort news!
Current thread:
- High PatMatch eltra1n (Oct 18)
- Re: High PatMatch Joel Esler (Oct 18)
- Re: High PatMatch rmkml (Oct 19)