aboutsummaryrefslogtreecommitdiffstats
path: root/framework/src/suricata/doc/Debian_Installation.txt
diff options
context:
space:
mode:
Diffstat (limited to 'framework/src/suricata/doc/Debian_Installation.txt')
-rw-r--r--framework/src/suricata/doc/Debian_Installation.txt90
1 files changed, 90 insertions, 0 deletions
diff --git a/framework/src/suricata/doc/Debian_Installation.txt b/framework/src/suricata/doc/Debian_Installation.txt
new file mode 100644
index 00000000..878e0dd6
--- /dev/null
+++ b/framework/src/suricata/doc/Debian_Installation.txt
@@ -0,0 +1,90 @@
+Autogenerated on 2012-11-29
+from - https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Debian_Installation
+
+
+Debian Installation
+
+
+Pre-installation requirements
+
+Before you can build Suricata for your system, run the following command to
+ensure that you have everything you need for the installation.
+Make sure you will enter all the following commands as root/super-user,
+otherwise it will not work.
+
+ apt-get -y install libpcre3 libpcre3-dbg libpcre3-dev \
+ build-essential autoconf automake libtool libpcap-dev libnet1-dev \
+ libyaml-0-2 libyaml-dev zlib1g zlib1g-dev libmagic-dev libcap-ng-dev \
+ pkg-config
+
+Depending on the current status of your system, it may take a while to complete
+this process.
+
+HTP
+
+HTP is bundled with Suricata and installed automatically. If you need to
+install HTP manually for other reasons, instructions can be found at HTP
+library_installation.
+
+IPS
+
+By default, Suricata works as an IDS. If you want to use it as a IDS and IPS
+program, enter:
+
+ apt-get -y install libnetfilter-queue-dev libnetfilter-queue1 libnfnetlink-
+ dev libnfnetlink0
+
+
+Suricata
+
+To download and build Suricata, enter the following:
+
+ wget http://www.openinfosecfoundation.org/download/suricata-1.3.3.tar.gz
+ tar -xvzf suricata-1.3.3.tar.gz
+ cd suricata-1.3.3
+
+Compile and install the program
+If you plan to build Suricata with IPS capabilities, enter:
+
+ ./configure --enable-nfqueue --prefix=/usr --sysconfdir=/etc --
+ localstatedir=/var
+
+instead of
+
+ ./configure --prefix=/usr --sysconfdir=/etc --localstatedir=/var
+
+Continue with the next commands:
+
+ ./configure --prefix=/usr --sysconfdir=/etc --localstatedir=/var
+ make
+ make install
+
+To make sure the existing list with libraries will be updated with the new
+library, enter:
+
+ ldconfig
+
+
+Auto setup
+
+You can also use the available auto setup features of Suricata:
+ex:
+
+ ./configure && make && make install-conf
+
+make install-conf
+would do the regular "make install" and then it would automatically create/
+setup all the necessary directories and suricata.yaml for you.
+
+ ./configure && make && make install-rules
+
+make install-rules
+would do the regular "make install" and then it would automatically download
+and set up the latest ruleset from Emerging Threats available for Suricata
+
+ ./configure && make && make install-full
+
+make install-full
+would combine everything mentioned above (install-conf and install-rules) - and
+will present you with a ready to run (configured and set up) Suricata
+Please continue with the Basic_Setup.