A customer asked me to analyze their network flows, with a solution oriented towards using an nBox that collects NetFlow data from a router located away from the branch office, takes it in for analysis, and then sends it to a NetEye Elastic module, which act as an analysis console for that NetFlow data.
The first step involves choosing how to use the nBox, i.e., whether it should receive traffic on a dedicated socket, and where the correct configuration of the nprobe.conf file would thus have the directive:
[–c=6363]
or whether the nBox should receive traffic through a Span Port or Mirror Port, configured on board a network device such as a switch; in this case the correct configuration of the nprobe.conf file is with the directive:
In the use case under consideration, it was decided to use a Span Port, specifically to configure it as a switch, which physically connected the router port (whose NetFlow is to be analyzed) to the nBox port.
Consider the minimum network needs in terms of the physical layer, looking at the following diagram:
If the router and nBox cannot connect on the same switch, it may be useful configure a remote span port on your Layer2 Network Schema, from the switch where the router is plugged in and the switch where the nBox is plugged in, or it may be more comfortable using a TAP device: the nBox can operate in both cases.
In case you’d like the details and instructions for configuring NetFlow on a Cisco router, I’ve put here the CLI of a Cisco entry level device:
If you’d like details and guidance on how to configure the span port on a Cisco switch for example, do a search with the keywords Configuration Guide and Span Port.
Once the necessary wiring has been completed and the router and switch have been configured, it’s time to configure the nBox to send the NetFlow data received.
Proceed from the nBox Web GUI by selecting the Menu Application > nProbe.
Set the nProbe interface connected to the switch to ON,
Then configure the FQDN and port where Elastic is listening. The default port is 2055, as shown in the following screenshot:
After that, restart nProbe via the web GUI or an SSH session, and remember to also take a look at the bottom left of this web page, and follow the link Flow Export Format that will allow you to select the field you want to include in the emitted NetFlow:Then you can ask an Elastic specialist to configure an Index for you, probably a Filebeat, and then once the Elastic environment is configured using the Elastic WEB GUI, check that the NetFlow has been received by executing a query as follows:Remember to specify to the Elastic WEB GUI the IP address belonging to the nBox as netflow.exporter.address, and also check from the Index Management Menu of Elastic for the presence of the index dedicated to NetFlow as shown here:
Hi all, my name is Davide and I was born in San Donato Milanese. Since I was a boy I've always been intrigued by PCs, and so I took my first steps with my Commodore VIC-20. Before joining Würth Phoenix as an SI consultant, I worked first as a Network Engineer for several ISPs (Internet Service Providers) in the late 90s, then for the first ASP (Application Service Provider) and next as a head of IT Network and Security. My various ITIL and Vendor certifications have allowed me to be able to cooperate at multiple project levels. I like tennis, music, motorcycles and going on nature walks with my family.
Author
Giovanni Davide Saccá
Hi all, my name is Davide and I was born in San Donato Milanese. Since I was a boy I've always been intrigued by PCs, and so I took my first steps with my Commodore VIC-20. Before joining Würth Phoenix as an SI consultant, I worked first as a Network Engineer for several ISPs (Internet Service Providers) in the late 90s, then for the first ASP (Application Service Provider) and next as a head of IT Network and Security. My various ITIL and Vendor certifications have allowed me to be able to cooperate at multiple project levels. I like tennis, music, motorcycles and going on nature walks with my family.
This article gives an overview and offers a practical tips to detecting some suspicious activities in Microsoft SQL Server, from configuring audit policies to leveraging Elastic for effective monitoring and threat detection. Introduction Microsoft SQL Server is one of the Read More
If you're monitoring an OpenShift or a Kubernetes cluster with Elastic Stack, you might've noticed that the Kubernetes integration uses the default Index Lifecycle Policy. It means that those logs and metrics have an unlimited retention. If the volume of Read More
In a previous post we went through the configuration of Elastic Universal Profiling in NetEye, seeing how we can profile applications written in programming languages that do not compile to native code (for example Python, PHP, Perl, etc.) But what Read More
Elastic 8.16, which comes with NetEye 4.39, made Elastic Universal Profiling generally available for self-hosted installations. This means that NetEye SIEM installations will now be able to take advantage of the continuous profiling solution by Elastic. In this blog post Read More
Logs should be centralized, easily accessible, and independent from the monitored objects. Therefore, it's advisable not to rely solely on the built-in monitoring system of OpenShift; instead, consider using an additional external monitoring solution. In this article, we'll explore how Read More