- CheckMates
- :
- Products
- :
- Quantum
- :
- Security Gateways
- :
- Re: Monitoring of Anti-Spoofing traffic
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Monitoring of Anti-Spoofing traffic
Hello guys,
Is there any way how to monitor anti-spoofing traffic in R77.30 ? I know that I can choose Alert, Log or None in spoofing properties for specific interface. But does someone know how to send for example syslog event in case gateway recognize spoofing traffic ? Or send mail ...
Searching all logs to found "spoofing" word in Information isnt good approach... There must be something on CLI how to check if interface faced spoofing traffic (as it issue log event towards log server).
Thanks for every suggestion in advance.
Jozko Mrkvicka
- Tags:
- spoofing
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
One place you can see anti-spoofing drop packets (albeit not on a specific interface) is cpview.
If you want Alerts to run a script, you can set that in Global Properties (but will apply for anything with Log type set to Alert):
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks, I will check that.
What is default path of that UserDefined script? Or can I use full path of script, like: /var/tmp/testing.sh ?
Jozko Mrkvicka
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You can use full path.
Offhand I am not sure what the default path is for this screen.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I was not managed to get it work
First, I want to test it via specific rule, so I have created new rule with Track: "Alert". My understanding is that the script located in /var/log/test.sh should be executed every time this specific rule is matched.
My settings in Global Properties:
According logs, the specific traffic is matched and I also see Alert in logs. The only problem is that it didnt activate the script.
I also tried to set Track as "UserDefined" and with this setup, the script was executed.
Is there any way how to do the same just for Alert (as in Anti-spoofing in R77.30 there are only following options available):
Jozko Mrkvicka
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
As far as I know both of these things should operate exactly the same.
I would open a TAC case.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Isnt some stats included in $FWDIR/state/local/FW1/local.set ? How cpview (SecureXL) knows how many packets were dropped because of anti-spoofing ?
Jozko Mrkvicka
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Look into sk56701, there are some ideas how to make it work. The fact script is not working means there is something wrong with it. Most probably variables.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Valeri,
The script is working in case I choose "UserDefined" in Track option for the particular rule.
In case I want to do the same for "Alert", it will not work.
My script looks like:
My rule looks like (it will not execute script):
This rule will execute the script:
And my Alert settings looks like:
Jozko Mrkvicka
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
That must be true. "Run popup alert script" means the binary is under $FWDIR/bin. If it is not, it is qualified as a "User defined alert"
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Dameon Welch Abernathy Valeri Loukine issue solved with following configuration of Alerts in Global Properties:
So now my final question is:
How can I simulate Address Spoofing for interface eth1.50 with subnet 10.20.30.0/24 to see if this is really working in case I will select Alert in Anti-Spoofing Tracking option ?
NOTE: I am running internal LAB in VMware, so I can do (almost) everything
Jozko Mrkvicka
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Create a VM with the desired address and try to ping "through" the firewall?
You'll probably have to muck with the routing/ARP tables to make it work right.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
easy, configure anti-spoofing manually and exclude some parts of your network attached to this interface. Link, instead of /24 do less than that.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello Jozko,
Was you able to perform this. Even I want to perform anti spoofing lab in vmware. Don't know howto do it.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
No, I was not able to simulate antispoofing traffic 😕
Jozko Mrkvicka
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I was able to.
Have a loom at this article i made on anti spoofing.
