[EMAIL PROTECTED] wrote on 09/27/2007 03:28:40 AM:

> Hi,
> 
>    I'm surely not in the right mailling list but I think you have an 
answer
> for my question ;-)
> 
> I'm trying to write a small script, using flow-tools, to convert 
Netscreen
> syslog output into flows to analyse them with Netflow Analyser. But as 
I'm
> new to netflow, I have a problem...
> 
> for example, if I connect to www.google.com I'll get the following line 
in
> my log :
> Sep 27 09:19:53 (traffic): start_time="2007-09-27 09:18:50" duration=67
> sent=3100 rcvd=10046 src=192.168.0.2 dst=64.233.183.104 src_port=1960
> dst_port=80
> 
> I miss the number of packet transmited, but it's not really a problem (I
> just want to know witch protocols are used on my network).
> 
> The problem is that I get a number of sent octets AND a number of 
received
> octets. But in a flow there is only something like transmited octets ...

Treat your firewall as a two-interface router. Map the 'sent' bytes from 
above as input into the 'local' interface of your router, and map the 
'rcvd' bytes as input into the 'Internet' interface. For flows in the 
opposite direction, do the opposite. This will simulate a router exporting 
netflow, since (typically) the router collects netflow as input bytes only 
to interfaces.
 
> So this is my question. How Netflow identify the In and Out traffic ? 

Unless you're using a very modern IOS, netflow will only collect and 
export *input* data to each interface on which you are running netflow. 
Output data can be examined by filtering on all data with an 'outbound' 
interface equal to the one you're interested in.

> Is there, for a tcp connection, 2 flows : one by direction ? If it's 
that, how
> Netflow identify that these 2 flows are for the same TCP connection ?

Netflow ignores connections and only looks at input traffic.

HTH,

Joe
_______________________________________________
Flow-tools mailing list
[EMAIL PROTECTED]
http://mailman.splintered.net/mailman/listinfo/flow-tools

Reply via email to