Hi guys,
   Not sure if this has been discussed before, but we are getting feature
requests for an IDS or packet-sniffing/monitoring capability. I have a
prototyped idea of how to do this (manual config), but would like some
input.

We create a network offering or network capability/detail that is
specifically a 'sniffer net'. This would be relatively simple, and just do
two things:

1) when network is added to VPC, spin up a simple daemon on the VPC router
that does traffic mirroring (netsniff-ng or daemonlogger are debian
packages) from the public interface to the 'sniffer net' interface.

2) disables mac learning on the bridges created for the sniffer net, so
that an IDS system can come up in this net and see all of the mirrored
traffic. It wouldn't handle making the IDS appliance, that would be up to
the customer, it would simply create a network that enables traffic
monitoring for the VPC.

I think we'd prefer any VMs brought up in this network to live on the same
host as the router for performance reasons, but that's probably not an
immediate requirement. I dislike the idea of trying to run an actual
capture saved to the VPC router, or an IDS software on the VPC router that
would need to be updated.

We could also run traffic mirroring from the VPC router's interface
directly to another VM's interface, host side (daemonlogger -i vpcintf -o
idsintf), but it would need to be on the same host.

Reply via email to