New article on SNMPv3 INFORMs and software updates

Of late  I have been seeing a good number of Unbrowse SNMP customers using SNMPv3 INFORM messages. This is pleasantly surprising because I had written off this baby as being too complex to setup.

Here is an article explaining how to set up Unbrowse SNMP to receive and respond to SNMPv3 INFORM messages. It covers both the cases of provisioned Engine ID (like Cisco) and Engine ID discovery.

The following software updates are also available for download

  • Unbrowse SNMP 1.6.1296
  • Juniper MIB Packages

Trisul NSM platform intro

So what is Trisul Network Metering and Forensics ?

Here is the Trisul login screen,  I especially liked it because it captured the zen of network security monitoring so effectively.

We observe

  • a freeway with traffic in both directions (head lights on right , tail lights on left)
  • vehicles move very fast
  • its twilight – we can see, kindof

Now imagine, we are asked to keep tabs on what types of cars went by, which semi trucks are suspiciously overloaded, which cars make unusual trips ?  This is roughly what we are asking of network security monitoring.

Trisul approaches NSM from a traffic monitoring centric position. You can contrast that with Sguil that approaches from an alert centric position.

  • Trisul contains powerful long term metering and top-n tracking
  • Stores full content in a efficient AES128 CTR encrypted ring
  • Tracks Flows
  • Alerts from 3rd party (accepts Snort input via Unix sockets, working on Unified2 to accept Suricata)
  • Rule based full content engine. (eg, track only first MB, exclude subnet, headers only, etc)
  • Pull out and save HTTP transactions (IP/TCP reassembly can handle bad frag)

Lets deep dive into Trisul in the next few posts.

Unsniff Tip : Filtering Netflow Records

Logo

Lately, we are working with Netflow quite a bit for our upcoming release of Trisul Network Metering. Here is a tiny script we find invaluable while looking at network captures containing Netflow traffic.

Often while troubleshooting issues we need to look at the raw Netflow records.

For example : You may want to see all the Netflow records sent for IP = 10.22.1.29

Display filters wont get you far because you will still be left with individual packets. These packets themselves can contain dozens of records of which only one or two match.

We turned to Unsniff Scripting and wrote a simple Ruby script that allows you to query for netflow records matching any field value.  We use this script heavily for our internal testing and wish to share it on the blog.

To use this script.

1. Import the capture file in tcpdump format into Unsniff (or capture off a live interface)

2. Save the file as USNF format

3. Start querying using the script

More :

Unsniff Scripting Home

Download Unsniff