--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onion+unsubscribe@googlegroups.com.
To post to this group, send email to security-onion@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
I may be off point here, because I am not familiar with GNS3, but I believe you need to set up port-mirroring or a span port on the switch you have the SO machine connected to. There are a few articles on the web, and some videos on YouTube that demonstrate setting up port-mirroring in GNS3.
In my physical environment, I have both a physical network tap (for my public IP's on my Cloud stack) and a port-mirror on my internal network switch, which allows me to monitor my internal network.
Hi thanks for both of your replies. I have tried configuring the SO VM with the recommended and updated hardware requirements and the IDS is still not detecting the traffic. I have again confirmed through wireshark that the sniffing interface can indeed see this traffic so I just do not understand why the IDS isn't seeing it. This leads me to the second answer from Alabarge, I do not have a switch configured in my topology it is a generic hub, so in a real network I would need a switch with either a tap or port forwarding/mirroring, as you said, to get the traffic to the IDS however since I am using a hub the traffic is being sent to the IDS without further configuration, again this is verified by wireshark ran on the sniffing interface on the SO VM, thanks for both of your replies.
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onion+unsubscribe@googlegroups.com.
To post to this group, send email to security-onion@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
Robert,Have you tried switching to Suricata to see if you get different results?Have you tried taking a look at Bro logs, etc to see if they are getting written to disk, etc.Thanks,Wes
On Thu, Apr 12, 2018 at 1:08 PM, Robert Moss <robert.j...@gmail.com> wrote:
Hi thanks for both of your replies. I have tried configuring the SO VM with the recommended and updated hardware requirements and the IDS is still not detecting the traffic. I have again confirmed through wireshark that the sniffing interface can indeed see this traffic so I just do not understand why the IDS isn't seeing it. This leads me to the second answer from Alabarge, I do not have a switch configured in my topology it is a generic hub, so in a real network I would need a switch with either a tap or port forwarding/mirroring, as you said, to get the traffic to the IDS however since I am using a hub the traffic is being sent to the IDS without further configuration, again this is verified by wireshark ran on the sniffing interface on the SO VM, thanks for both of your replies.
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onion+unsubscribe@googlegroups.com.
To post to this group, send email to securit...@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onion+unsubscribe@googlegroups.com.
To post to this group, send email to security-onion@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onion+unsubscribe@googlegroups.com.
To post to this group, send email to security-onion@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onion+unsubscribe@googlegroups.com.
To post to this group, send email to security-onion@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.