On Tue, Mar 15, 2016 at 9:53 PM, <
hamed.fa...@gmail.com> wrote:
> Dear
> Mikrotik routers have a sniffer tool, It can sniff and send the traffics to
> a streaming server by Tazmen Sniffer Protocol.
Is that a proprietary feature/protocol ?
> To use this feature, I has trafr application and download it from mikrotik
> website.
> I run it by this syntax on ubuntu
>
> trafr -s | suricata -c /etc/suricata/suricata.yaml -r -
>
> it receive the traffics and convert to pcap format and then send to suricata
> I want to know, how can I use this application on SELKS and run suricata
> after this application?
The simplest way I could think of is to replay the pcap on the same
interface that suricata already listens to. That way there will be no
config changes needed inside SELKS for example.
If you would like suricata to just read the pcap then you can use:
suricata -c /etc/suricata/suricata.yaml -r /path/to/pcap
> Thanks and Best regards,
> Hamed
>
> --
> IRC: Let's talk about SELKS on Freenode IRC on the #SELKS channel
> Wiki:
https://github.com/StamusNetworks/SELKS/wiki
> GitHub:
https://github.com/StamusNetworks/SELKS
> Blog:
https://www.stamus-networks.com/theblog/
> Twitter: @StamusN
> g+: Stamus Networks
> ---
> You received this message because you are subscribed to the Google Groups
> "SELKS" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to
selks+un...@googlegroups.com.
> To post to this group, send email to
se...@googlegroups.com.
> For more options, visit
https://groups.google.com/d/optout.
--
Regards,
Peter Manev