1 |
#--------------------------------------------------------------------- |
2 |
#- Example configuration file for anfud. |
3 |
#- rabit@netfrag.org, 05.11.2004 |
4 |
#- ($Id$) |
5 |
#--------------------------------------------------------------------- |
6 |
|
7 |
# Target file or device for anfud logging: |
8 |
# (default: "LOGTARGET=/var/log/anfud.log") |
9 |
# |
10 |
#LOGTARGET=/var/log/anfud.log |
11 |
|
12 |
# The log file to be scanned for intrusion attempts: |
13 |
# (default: "SCANLOG=/var/log/syslog") |
14 |
# |
15 |
#SCANLOG=/var/log/syslog |
16 |
|
17 |
# On start seek and parse log file from beginning: |
18 |
# (default: "SEEKSTART=1") |
19 |
# |
20 |
#SEEKSTART=1 |
21 |
|
22 |
# Follow the scan log file: |
23 |
# (default: "LOGFOLLOW=1") |
24 |
# |
25 |
#LOGFOLLOW=1 |
26 |
|
27 |
# Time between log file scans (in seconds): |
28 |
# (default: "INTERVAL=1") |
29 |
# |
30 |
#INTERVAL=1 |
31 |
|
32 |
# Space seperated list of addresses which must not be dropped: |
33 |
# (Wildcards may be used.) |
34 |
# (default: "EXCLUDE=''") |
35 |
# |
36 |
#EXCLUDE='' |
37 |
|
38 |
# Drop when illegal SSH login username: |
39 |
# (default: "DROP_SSH_ILLEGALUSER=1") |
40 |
# |
41 |
#DROP_SSH_ILLEGALUSER=1 |
42 |
|
43 |
# Drop when FTP login failed: |
44 |
# (default: "DROP_FTP_FAILEDLOGIN=1") |
45 |
# |
46 |
#DROP_FTP_FAILEDLOGIN=1 |
47 |
|
48 |
# Log address dropping to the system log: |
49 |
# (default: "LOG_DROPPED=1") |
50 |
# |
51 |
#LOG_DROPPED=1 |
52 |
|
53 |
#LOG_ADDRESSES=0 |
54 |
|
55 |
#LOGADDR_FORMAT='%d %a' |
56 |
|
57 |
# Pretend operation(s) (parse only): |
58 |
# (default: "PRETEND=0") |
59 |
# |
60 |
#PRETEND=0 |
61 |
|
62 |
#--------------------------------------------------------------------- |