How To Install Snort NIDS On CentOS 7


There are few and straight forward administration guides are available for snort on the web. Today, we will try to explain anatomy of snort step by step. Snort is an NIDS (Network Intrusion and Detection System) used to detects and prevent intrusions over the network. Through protocol searching, content analysis and various preprocessors, snort detects thousands of worms and vulnerability attempts. Snort comes with an excellent feature including detection of various types of attacks, buffer overflow, stealth port scan, CGI Attacks etc.

Configuration file of Snort configuration is /etc/snort/snort.conf in which information of network under investigation is determined.

Sample configuration file


Snort can be configured in three modes.

A. Sniffer Mode

Output will dump to the terminal in this mode, it is used to display packets in continuous flow to the user in live mode, in live mode or sniffer mode data packet losses are very high so it is recommended to used sniffer mode NIDS only for small networks only.

B. Packet Logger Mode

Output will get logged to the disk, which can be monitored later on.

snort -l  <Log_Directory>  is the option which is used for logging mode.

C. Network IDS Mode

In IDS mode some parameters are configured that allow snort to match defined parameters while scanning the network, parameters are used defined in this mode.

Prerequisites for Installation

Make sure that following packages are already installed with the system you  are going to configure snort-

CentOS 7.0, Snort latest, DAQ (Data Acquisition Package) Available with  Snort.

Snort  and DAQ latest version can be obtain from this link.

Download and Install DAQ

[[email protected] ~]# yum install Download Snort

 Download and Install Snort

[[email protected] ~]# yum install

Important: If you install snort first instead of DAQ there could be some decency issue with yum.

Install Snort Rules

To install snort rules you must register to this link then we will be able to download rules for snort configuration.

Download Rules


To manage Snort rules pulledpork package is available on Git hub, which can be downloaded with following command.

[[email protected] ~]# git clone


Let us Configure pulledpork

Go to the downloaded directory
[[email protected] ~]# cd pulledpork/
Copy to /usr/local/bin
[[email protected] pulledpork]# cp /usr/local/bin
Change permissions of
[[email protected] pulledpork]# chmod +x /usr/local/bin/
Copy contents of etc directory from pulledpork to system default snort /etc/snort
[[email protected] pulledpork]# cp -v etc/*.conf /etc/snort
‘etc/disablesid.conf’ -> ‘/etc/snort/disablesid.conf’ ‘etc/dropsid.conf’ -> ‘/etc/snort/dropsid.conf’ ‘etc/enablesid.conf’ -> ‘/etc/snort/enablesid.conf’ ‘etc/modifysid.conf’ -> ‘/etc/snort/modifysid.conf’ ‘etc/pulledpork.conf’ -> ‘/etc/snort/pulledpork.conf’
Create a directory under /etc/snort named as iplists, this directory will be used by Pulledpork.
[[email protected] snort]# mkdir /etc/snort/rules/iplists
Go to this newly created file and create a file named ‘default.blacklists’
[[email protected] iplists]# touch /etc/snort/rules/iplists/default.blacklist
Test pulledPork Configuration
[[email protected] iplists]# /usr/local/bin/ -V

Configure Dynamic Rules for Snort

Edit /etc/snort/snort.conf to enable dynamic rules setup, search and  make sure following  three line are uncomment in /etc/snort/snort.conf.  

# path to dynamic preprocessor libraries 
dynamicpreprocessor directory /usr/lib64/snort- 
# path to base preprocessor engine 
dynamicengine /usr/lib64/snort- 
# path to dynamic rules libraries 
dynamicdetection directory /usr/local/lib/snort_dynamicrules
Execute following Command
[[email protected] rules]#  echo "include \$RULE_PATH/so_rules.rules" >> /etc/snort/snort.conf
[[email protected] rules]#  echo "include \$RULE_PATH/local.rules" >> /etc/snort/snort.conf
[[email protected] rules]# echo "include \$RULE_PATH/snort.rules" >> /etc/snort/snort.conf
Restart Snort Service
[[email protected] rules]# systemctl restart snortd

Some Snort Examples

To get TCP/IP header in report,  You can see IP address with this option,  type

# snort -v

Sample Output:


To get application Layer information along-with IP related info, type

# snort -vd


To get rid of hex in output, type

# snort -vdC

-C option will remove hex valued from output

Sample Output:


You can get information of all 6 Layers of OSI Model Except Layer 1, with:

# snort -vdeC


Have a try! and let us know what do you think about Snort.

Reference links: