Greetings;

First, thank you all (& Peter) for your great efforts in the nfdump
project, it's become a great help to me recently.

I am working on a project which uses Splunk, but due to some license
limitations, I have been forced (for now) to direct ASA firewall NF
exporters to a Linux machine, which is then received by nfdump.   I am
using nfsen to view my data, and am hoping to be able to quickly profile
the entire environment so that I can make recommendations for which
outbound ports should be blocked (outbound everything is presently
permitted).  There are many outbound connections using ports > 1024 that
have a legitimate business purposes, and weeding through them all would
make my job 24x7. My goal is to identify non-business required ports
greater that 1024 so that I can begin my block rules on my firewalls,
allowing for exceptions as required.

Since this is a monumental task, I was hoping to detect any outbound
traffic against the many threat lists already contained in Splunk, these
are mostly CSV files containing either subnets or IP addresses to known bad
actor sites.

Is there a plugin, or post-processing tool l could use that would report
this information for me?

Any insight or assistance would be greatly appreciated.

Kind regards,


-mike
------------------------------------------------------------------------------
_______________________________________________
Nfdump-discuss mailing list
Nfdump-discuss@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/nfdump-discuss

Reply via email to