TCP_PORTS="1,11,15,79,111,119,143,540,635,1080,1524,2000,5742,6667,12345,12346,20034,27665,31337,32771,32772,32773,32774,40421,49724,54320" ####TCP模式监听的端口####
UDP_PORTS="1,7,9,69,161,162,513,635,640,641,700,37444,34555,31335,32770,32771,32772,32773,32774,31337,54321" ####UDP模式监听的端口#####
ADVANCED_PORTS_TCP="1024" ####调整TCP监听范围####
ADVANCED_PORTS_UDP="1024" ####调整UDP监听范围####
ADVANCED_EXCLUDE_TCP="113,139" ####TCP 端口排除范围###
ADVANCED_EXCLUDE_UDP="520,138,137,67" ####UDP 端口排除范围###
IGNORE_FILE="/usr/local/psionic/portsentry/portsentry.ignore" ###算是可信的扫描IP表吧####
HISTORY_FILE="/usr/local/psionic/portsentry/portsentry.history" ###扫描的入侵主机历史记录###
BLOCKED_FILE="/usr/local/psionic/portsentry/portsentry.blocked" ###被阻止连接的IP记录###
RESOLVE_HOST = "1" ###配置是否解析,0表示不解析,建议0###
BLOCK_UDP="1" ###0表示无动作,1送防火墙,2执行脚本,默认1###
BLOCK_TCP="1" ###0表示无动作,1送防火墙,2执行脚本,默认1###
KILL_HOSTS_DENY="ALL: $TARGET$" ###TCP warppers 阻止的写入方式 就这个调调###
SCAN_TRIGGER="0" ###扫描触发几次触发执行操作###