On 08/08/15 16:53, Mike wrote:
> Greetings;
> 
> First, thank you all (& Peter) for your great efforts in the nfdump project, 
> it's become a great help to me recently. 
> 
> I am working on a project which uses Splunk, but due to some license 
> limitations, I have been forced (for now) to direct ASA firewall NF exporters 
> to a Linux machine, which is then received by nfdump.   I am using nfsen to 
> view my data, and am hoping
> to be able to quickly profile the entire environment so that I can make 
> recommendations for which outbound ports should be blocked (outbound 
> everything is presently permitted).  There are many outbound connections 
> using ports > 1024 that have a
> legitimate business purposes, and weeding through them all would make my job 
> 24x7. My goal is to identify non-business required ports greater that 1024 so 
> that I can begin my block rules on my firewalls, allowing for exceptions as 
> required.
> 
> Since this is a monumental task, I was hoping to detect any outbound traffic 
> against the many threat lists already contained in Splunk, these are mostly 
> CSV files containing either subnets or IP addresses to known bad actor sites.
> 

Hmm .. I'm not aware of an automatic plagin, but if you have IPs and net ranges 
from a csv file, you should be able to easily create a filer file like

ip in [
1.2.3.4
2.3.4.5
3.4.5.6/27
..
]

I would create an simple profile and use the term "@include <filename>" as 
filter, where as <filename> is the file you created as described above.

Hope, that helps

        - Peter

> Is there a plugin, or post-processing tool l could use that would report this 
> information for me? 
> 
> Any insight or assistance would be greatly appreciated.
> 
> Kind regards,
> 
> 
> -mike

------------------------------------------------------------------------------
_______________________________________________
Nfdump-discuss mailing list
Nfdump-discuss@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/nfdump-discuss

Reply via email to