Настроил Juniper MX204
# Настройка шаблонов IPFIX
set services flow-monitoring version-ipfix template ipfix-ipv4
set services flow-monitoring version-ipfix template ipfix-ipv4 flow-active-timeout 10
set services flow-monitoring version-ipfix template ipfix-ipv4 flow-inactive-timeout 10
set services flow-monitoring version-ipfix template ipfix-ipv4 template-refresh-rate packets 2000
set services flow-monitoring version-ipfix template ipfix-ipv4 template-refresh-rate seconds 30
set services flow-monitoring version-ipfix template ipfix-ipv4 option-refresh-rate packets 8000
set services flow-monitoring version-ipfix template ipfix-ipv4 option-refresh-rate seconds 120
set services flow-monitoring version-ipfix template ipfix-ipv4 ipv4-template
# Настройка экземпляра экспорта данных потоков
set forwarding-options sampling instance ipfix-inline input rate 1000
set forwarding-options sampling instance ipfix-inline family inet output flow-server 10.100.96.96 port 2055
set forwarding-options sampling instance ipfix-inline family inet output flow-server 10.100.96.96 autonomous-system-type origin
set forwarding-options sampling instance ipfix-inline family inet output flow-server 10.100.96.96 version-ipfix template ipfix-ipv4
set forwarding-options sampling instance ipfix-inline family inet output inline-jflow source-address 10.100.100.225
# Включение на шасси
set chassis fpc 0 sampling-instance ipfix-inline
set chassis fpc 0 inline-services report-zero-oif-gw-on-discard
set chassis fpc 0 inline-services flex-flow-sizing
# Применение настройки на интерфейсе
set interfaces et-0/0/1 unit 3360 family inet sampling input
но в итоге через fastnetmon_client вижу только IP из своих сетей (networks_list), хотя я думал что буду видеть IP с которых идет атака, что я делаю не так?
среда, 15 мая 2024 г. в 18:30:46 UTC+3, Pavel Odintsov: