пятница, 1 июля 2016 г., 1:41:38 UTC+3 пользователь Wes написал:
Hi Wes!
Thanks for this. I have followed the article, but it appeared that L3 Encapsulation option in VMWare uses GRE to encapsulate mirrored traffic.
Here is what tcpdump shows on eth1 (192.168.255.194 is IP of eth1):
07:16:00.490370 IP 192.168.165.130 >
192.168.255.194: GREv0, key=0x2000000, length 68: IP 192.168.145.12.80 > 192.168.255.74.63228: Flags [.], ack 23656, win 64860, length 0
07:16:00.491173 IP 192.168.165.130 >
192.168.255.194: GREv0, key=0x0, length 1442: IP 192.168.255.74.63228 > 192.168.145.12.80: Flags [.], seq 23656:25036, ack 1, win 64860, length 1380
07:16:00.492403 IP 192.168.165.130 >
192.168.255.194: GREv0, key=0x0, length 1442: IP 192.168.255.74.63228 > 192.168.145.12.80: Flags [.], seq 25036:26416, ack 1, win 64860, length 1380
07:16:00.492481 IP 192.168.165.130 >
192.168.255.194: GREv0, key=0x2000000, length 68: IP 192.168.145.12.80 > 192.168.255.74.63228: Flags [.], ack 26416, win 64860, length 0
However what I see in Sguil is:
Count:4 Event#3.44801 2016-07-01 07:01:05
GPL DNS zone transfer UDP
192.168.165.130 -> 192.168.255.194
IPVer=4 hlen=5 tos=0 dlen=153 ID=13063 flags=0 offset=0 ttl=63 chksum=36146
Protocol: 47 ------------------------------------------------------------------------
Count:1 Event#3.49250 2016-07-01 07:44:04
GPL NETBIOS SMB IPC$ unicode share access
192.168.165.131 -> 192.168.255.194
IPVer=4 hlen=5 tos=0 dlen=168 ID=65269 flags=0 offset=0 ttl=63 chksum=49459
Protocol: 47 ------------------------------------------------------------------------
Count:1 Event#3.64667 2016-07-01 09:48:09
ET CINS Active Threat Intelligence Poor Reputation IP TCP group 87
192.168.165.130 -> 192.168.255.194
IPVer=4 hlen=5 tos=0 dlen=84 ID=31175 flags=0 offset=0 ttl=63 chksum=18103
Protocol: 47 ------------------------------------------------------------------------
Count:1 Event#3.70823 2016-07-01 10:54:41
ET CINS Active Threat Intelligence Poor Reputation IP TCP group 86
192.168.165.130 -> 192.168.255.194
IPVer=4 hlen=5 tos=0 dlen=84 ID=19287 flags=0 offset=0 ttl=63 chksum=29991
Protocol: 47
Looks like Snort doesn't decode GRE packets. But it shouldn't be the case as GRE is supported by default. Any other idea?