Hi Mike
bpf support in the daq-dna is available since r2679, so it is supposed to work 
with your version.
Do we have a chance to debug this on your machine?

Alfredo

On 16 Jul 2014, at 17:51, Mike Patterson <[email protected]> wrote:

> Hi all,
> 
> On my previous Snort sensor, built on an Endace DAG, I had a BPF for Snort to 
> exclude certain types of traffic. The BPF worked fine; Snort 2.9.5.1 and some 
> previous versions.
> 
> When I changed my Snort sensor to an X520 + PF_RING / DNA, that BPF stopped 
> working. I can tell that Snort is loading it - it says as much in syslog - 
> but it will still happily alert on traffic matching those exclusions.
> 
> I’ve tried various iterations (I posted more detail on the snort-users list 
> if anybody wants to look, or I can re-paste it here), but succinctly:
> 
> 1) I don’t think it’s Snort itself - it did work on my previous platform. I 
> tried differing versions of Snort just to be sure - 2.9.5.1, 2.9.6.0, 2.9.6.1.
> 
> 2) I built tcpdump from the PF_RING distribution, and handed it the same BPF 
> - it worked just fine, or at least, tcpdump didn’t complain about the BPF. I 
> did a trivial test:
> tcpdump -i dna1@0 -n -w test.lpc not net 10.0.0.1/24
> tcpdump -r test.lpc net 10.0.0.1/24
> and got the expected output (nothing). So I *think* that this means libpcap 
> (also built from PF_RING distribution) is fine.
> 
> 3) Following the advice and some other troubleshooting on snort-users, I 
> verified that I’m not seeing this traffic as a result of GRE tunnelling or 
> VLAN tags.
> 
> Versions:
> PF_RING 6.0.1
> pfring-daq-module-dna_r2795 (I’d also tried pfring-daq-module-dna_r2521)
> 
> The Intel-based machine is not yet in production, so I can fairly easily try 
> anything people might suggest.
> 
> Other details of my environment:
> RHEL 6.5
> Intel X520 NIC:
> 06:00.1 Ethernet controller: Intel Corporation Ethernet 10G 2P X520 Adapter 
> (rev 01)
> 
> /proc/net/pf_ring/info is:
> PF_RING Version          : 6.0.1 ($Revision: exported$)
> Total rings              : 0
> 
> Standard (non DNA) Options
> Ring slots               : 16384
> Slot version             : 15
> Capture TX               : No [RX only]
> IP Defragment            : Yes
> Socket Mode              : Standard
> Transparent mode         : No [mode 2]
> Total plugins            : 0
> Cluster Fragment Queue   : 0
> Cluster Fragment Discard : 0
> 
> The X520 plugs into a tool port on an Arista 7150S. The DAG plugs into 
> another tool port on the same switch; both tool ports are in the same 
> aggregation group, so they should be getting identical data.
> 
> I *do* have the option of applying the BPF on the Arista switch itself, 
> although I’d rather avoid that if I can.
> 
> Thanks in advance for any advice/debugging suggestions/etc.
> 
> Mike
> 
> _______________________________________________
> Ntop-misc mailing list
> [email protected]
> http://listgateway.unipi.it/mailman/listinfo/ntop-misc

_______________________________________________
Ntop-misc mailing list
[email protected]
http://listgateway.unipi.it/mailman/listinfo/ntop-misc

Reply via email to