diff --git a/README.md b/README.md index 3ba59e1..9f2dce7 100644 --- a/README.md +++ b/README.md @@ -84,6 +84,21 @@ Example OSSEC configuration: 5720 +Another script `router-drop.sh` will perform the same action on a remote router over SSH. This is useful in case of embedded routers where OSSEC agent installation is unfeasibile. OpenWRT logs (over syslog) to a more powerful Linux box with OSSEC installed. On alerts the active response script installed that blocks uoffending IP addresses on the router: + +``` + +---------+ ----- syslog -------> +-------+ +--| OpenWRT | | Linux | + | | | OSSEC | + +---------+ <- active response -- +-------+ + +``` + +The `router-drop.sh` script requires two configuration steps: + +* configure the `ROUTER` variable to a SSH string for root login to the router (e.g. *root@gw.example.com*) +* install SSH keys to actually log in; the keys need to be installed on root account as this is where active response script are running + ## Samples Number of blacklisted IP addresses: