This repository provides a Dockerized deployment of Snort3, a powerful network intrusion prevention system. It simplifies the use of Snort3 for Network Functions Virtualization (NFV).
Note: Depending on your setup, you may need to use
sudo
for Docker commands.
To launch the Snort3 Docker container with full network access, use the following command:
docker run -it --rm --net=host ghcr.io/bengo237/snort3:latest /bin/bash
In some cases, you might need to add --cap-add=NET_ADMIN
or --privileged
to the Docker command. However, be cautious when using --privileged
as it grants all capabilities to the container, which requires careful consideration.
To validate the Snort configuration, run the following command:
snort -c /usr/local/etc/snort/snort.lua
For more information on Snort3 and its configuration, visit the official Snort documentation.
Contributions are welcome! Please fork the repository and submit a pull request with your changes.
This project is licensed under the MIT License. See the LICENSE file for details.
If you find this project helpful, please consider giving it a star on GitHub! ⭐
If you reuse or fork this repository, kindly mention the original repository to give credit. Thank you for your support!