On 08/08/15 16:53, Mike wrote:
> Greetings;
>
> First, thank you all (& Peter) for your great efforts in the nfdump project,
> it's become a great help to me recently.
>
> I am working on a project which uses Splunk, but due to some license
> limitations, I have been forced (for now) to direct ASA firewall NF exporters
> to a Linux machine, which is then received by nfdump. I am using nfsen to
> view my data, and am hoping
> to be able to quickly profile the entire environment so that I can make
> recommendations for which outbound ports should be blocked (outbound
> everything is presently permitted). There are many outbound connections
> using ports > 1024 that have a
> legitimate business purposes, and weeding through them all would make my job
> 24x7. My goal is to identify non-business required ports greater that 1024 so
> that I can begin my block rules on my firewalls, allowing for exceptions as
> required.
>
> Since this is a monumental task, I was hoping to detect any outbound traffic
> against the many threat lists already contained in Splunk, these are mostly
> CSV files containing either subnets or IP addresses to known bad actor sites.
>
Hmm .. I'm not aware of an automatic plagin, but if you have IPs and net ranges
from a csv file, you should be able to easily create a filer file like
ip in [
1.2.3.4
2.3.4.5
3.4.5.6/27
..
]
I would create an simple profile and use the term "@include <filename>" as
filter, where as <filename> is the file you created as described above.
Hope, that helps
- Peter
> Is there a plugin, or post-processing tool l could use that would report this
> information for me?
>
> Any insight or assistance would be greatly appreciated.
>
> Kind regards,
>
>
> -mike
------------------------------------------------------------------------------
_______________________________________________
Nfdump-discuss mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/nfdump-discuss