IDS mailing list archives
Re: Sniffing split connections
From: Barrett G.Lyon <blyon () prolexic com>
Date: Wed, 20 Apr 2005 00:17:48 -0400
Another option: FreeBSD supports interface bridging, you could have two interfaces on a single FreeBSD machine and bridge them both together to have a unified place to sniff from.
-Barrett On Apr 13, 2005, at 2:45 PM, Geff Ambrose wrote:
ChrisA question for you, the handoff from the ATM switch is it Ethernet or ATM? If it is Ethernet you should check out a company called Top Layer networks, they have a product called the IDS Balancer that plays well in asymmetric environments and will reassemble the traffic flows for you. your snort boxes will see both sides of the traffic and you can then load balance to a bunch of sensorswww.toplayer.com Geff -----Original Message----- From: Chris Mills [mailto:securinate () gmail com] Sent: Monday, April 11, 2005 12:37 PM To: focus-ids () securityfocus com Subject: Sniffing split connections Hi all- Here's the problem I'm having: I have a client site that has two physical connections from its ATM switch that connect to two different providers. The ATM switch uses both connections all the time (not set up as a failover.) The ATM switch at the site will not let me mirror the ports so I can't sniff there... and after the two providers, the connection is too fast for my equipment. I am using Snort 2.3.2 on PowerEdge 1750's. If I place a sniffer at both provider A and provider B, is there a way I can reassemble the traffic so I can see complete sessions? The two providers are on different sides of town. |--------|PROVIDER A|\ Client Site| |-----------|INTERNET| |--------|PROVIDER B|/ Thanks very much, Chris----------------------------------------------------------------------- ---Stop hurting your network!The NeVO passive vulnerability sensor continuously finds vulnerabilities,applications and new hosts without the need for network scanning.It also finds compromised systems with application-based intrusion detection.Go to http://www.tenablesecurity.com/products/nevo.shtml to learn more.----------------------------------------------------------------------- -------------------------------------------------------------------------- ---Stop hurting your network!The NeVO passive vulnerability sensor continuously finds vulnerabilities,applications and new hosts without the need for network scanning.It also finds compromised systems with application-based intrusion detection.Go to http://www.tenablesecurity.com/products/nevo.shtml to learn more.----------------------------------------------------------------------- ---
-------------------------------------------------------------------------- Stop hurting your network!The NeVO passive vulnerability sensor continuously finds vulnerabilities, applications and new hosts without the need for network scanning. It also finds compromised systems with application-based intrusion detection. Go to http://www.tenablesecurity.com/products/nevo.shtml to learn more.
--------------------------------------------------------------------------
Current thread:
- Sniffing split connections Chris Mills (Apr 13)
- Re: Sniffing split connections Richard Bejtlich (Apr 15)
- Re: Sniffing split connections Tony Carter (Apr 15)
- Re: Sniffing split connections rusty chiles (Apr 15)
- Re: Sniffing split connections Chris Mills (Apr 15)
- Re: Sniffing split connections Adam Powers (Apr 20)
- <Possible follow-ups>
- RE: Sniffing split connections Geff Ambrose (Apr 15)
- Re: Sniffing split connections Barrett G . Lyon (Apr 20)
- Re: Sniffing split connections Johann_van_Duyn (Apr 19)