[Oisf-users] Suricata VLAN

Christophe Vandeplas christophe at vandeplas.com
Wed Feb 15 09:28:00 UTC 2012


Hello Eric,

I think you misunderstood the situation. (or I am misunderstanding your answer)

We are mirroring one physical port of the switch.
That port is configured as an access port, in vlan X.   (so no VLAN trunk)

Our sniffing port seems to send out the traffic from the mirrored physical port,
but the inbound traffic contains a VLAN tag,
and the outbound traffic is in the native VLAN.

In other words , a TCP handshake is:
10.0.0.1  -> 2.2.2.2 SYN    native vlan
2.2.2.2 -> SYN/ACK   tagged vlan X
10.0.0.1 -> 2.2.2.2 ACK   native vlan.

It seems to be a "feature" of this switch. (how it handles traffic
internally in the switch)

So the thing is that I don't want to filter out the VLAN traffic,
but I'd like to know the impact on Suricata. Will it be able to
rebuild the TCP sessions, will it have impact on the IDS rules? ...

Thanks




On Wed, Feb 15, 2012 at 10:15 AM, Eric Leblond <eric at regit.org> wrote:
> Hello,
>
> Le mercredi 15 février 2012 à 10:11 +0100, Christophe Vandeplas a
> écrit :
>> Hello,
>>
>> I have a situation where a switch is acting 'originally' with traffic mirroring.
>>
>> The mirrored traffic in inbound direction is in the native vlan, and
>> the outbound is in a tagged vlan.
>>
>> I wonder how Suricata handles these flows.
>> Will it be able to reconstruct the TCP sessions correctly? Even if the
>> traffic is not in the same VLAN?
>>
>> What would be the impact if it doesn't reconstruct the traffic?
>> I'm certain that some things will still work, but I'm not certain
>> about the real impact.
>
> You may want to use a BPF expression to only select the packet from one
> of the VLAN. For example, "not vlan XX" should select only the incoming
> packets. This could avoid issue with seeing two times each packet.
>
> To provide a BPF, just add it at the end of suricata command line.
>
> BR,
> --
> Eric



More information about the Oisf-users mailing list