Provided by: suricata_3.2-2ubuntu3_amd64 bug

NAME

       suricata - Next Generation Intrusion Detection and Prevention Tool

SYNOPSIS

       suricata [OPTIONS] [BPF FILTER]

DESCRIPTION

       suricata  is  a  network  Intrusion Detection System (IDS). It is based on rules (and is fully compatible
       with snort rules) to detect a variety of attacks / probes by searching packet content.

       This engine supports Multi-Threading, Automatic Protocol Detection (IP, TCP, UDP, ICMP,  HTTP,  TLS,  FTP
       and  SMB),  Gzip  Decompression, Fast IP Matching and hardware acceleration on CUDA, OpenCL GPU cards and
       more.

       It supports acquiring packets through AF_PACKET, NFQUEUE, PF_RING, PCAP (live or offline) and more.

OPTIONS

       -c <path>
              Load main configuration file (by default, /etc/suricata/suricata.yaml).

       -T     Test configuration file (use with -c).

       -i <dev or ip>
              Run in PCAP live mode.

       -F <bpf filter file>
              Load BPF filter file.

       -r <path>
              Run in PCAP file/offile mode.

       -q <qid>
              Run in inline NFQUEUE mode.

       -s <path>
              Load signature file in addition to the main configuration file.

       -S <path>
              Load signature file exclusively.

       -l <dir>
              Set log directory (by default /var/log/suricata).

       -D     Run as a background daemon (suricata will fork itself).

       -k [all|none]
              Force checksum cheks (all) or disable it (none).

       -V     Print suricata version.

       -v[v]  Increase default verbosity.

       --list-app-layer-protos
              Print list of supported app layer protocols.

       --list-keywords[=all|csv|<kword>]
              List keywords implemented by the engine.

       --list-runmodes
              List supported runmodes.

       --runmode <runomde_id>
              Specific runmode in which the engine should run. The argument runmode_id should be the id  of  the
              runmode obtained using --list-runmodes.

       --engine-analysis
              Print reports on analysis of different sections in the engine.

       --pidfile <path>
              Write PID to the file.

       --init-errors-fatal
              Enable fatal failure on signature init error.

       --disable-detection
              Disable detection engine.

       --dump-config
              Show the running configuration.

       --build-info
              Display build information.

       --pacp[=<dev>]
              Run in PCAP mode. No dev value selects interfaces from main configuration file.

       --pcap-buffer-size
              Size of PCAP buffer. Values from 0 to 2147483647.

       --af-packet[=<dev>]
              Run in AF_PACKET mode. No dev value selects interfaces from main configuration file.

       --simulate-ips
              Force engine into IPS mode. Useful for QA.

       --user <user>
              Run suricata as this user after init.

       --group <group>
              Run suricata as this gorup after init.

       --unix-socket[=<file>]
              UNIX  socket  to  control  suricata  work  from  suricatasc(1).  The default is /var/run/suricata-
              command.socket.

       --set name=value
              Set configuration variable name to value.

EXAMPLES

       To run the engine with default configuration on interface eth0 with signature  file  "signatiures.rules",
       run the command as:

        % suricata -c suricata.yaml -s signatures.rules -i eth0

SEE ALSO

       suricatasc(1), tcpdump(1), pcap(3).

AUTHOR

       suricata was written by the Open Information Security Foundation.

       This  manual  page  was  written  by  Pierre  Chifflier  <pollux@debian.org>  and Arturo Borrero Gonzalez
       <arturo@debian.org> for the Debian project (and may be used by others).

                                                   10 Oct 2016                                       SURICATA(8)