RE: Packet Sniffing

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




I think using a sniffer on the firewall may not be a good idea (other than
for troubleshooting purpose) 
- as it will leave the box in promiscous mode

Use something like this -



		 -----------		    --------
 public    	|		|   	private  |		|----[Other
private machines/Hubs]
	------| firewall	|--------------|  HUB	|
 interface	|		|	network  |
|----[Machine with sniffer]
	 	 -----------		    --------		



Now all traffic flowing in and out of the private network can be sniffed by
using ethereal/tcpdump 
on the "Machine with sniffer".

Note that many of these so-called-HUB do switching between the 10 and 100
Mbps link. So you will
have to configure all the machines to use the same connectivity speed to be
able to see all traffic.


dhiraj


-----Original Message-----
From: Patrick Ahler [mailto:patrick@xxxxxxxxx]
Sent: 14 April 2003 19:30
To: netfilter EMAIL
Subject: Packet Sniffing


Using iptables as a firewall/gateway/router machine for my stub network.
Using snat and dnat to translate internal ip's to public and vice versa.

Want to setup a machine inside the network to packet sniff. I was hoping
iptables could do this. What I'd like is if iptables would route each
incoming packet to the correct machine, but also direct it to the packet
sniffer (in other words duplicate the packet and send to 2 destinations).

Just wondering if this is possible and if it is how can I set this up? I've
also tried doing all my packet sniffing off the firewall, but I've been
unsuccessful, can't seem to get ethereal to look at the forwarded packets.
If someone knows a way to successfully do setup either solutions please let
me know.

Thanks,
Patrick





[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux