Adding some info again. So: I get raw data from a span port from port eth3.. and here I see packets market with EF/46/0xb8
[root@xxxxxxx ~]# tcpdump -i eth3 -vvv -n ip and ip[1]=0xb8 tcpdump: WARNING: eth3: no IPv4 address assigned tcpdump: listening on eth3, link-type EN10MB (Ethernet), capture size 65535 bytes 16:01:51.868344 IP (tos 0xb8, ttl 45, id 41287, offset 0, flags [none], proto UDP (17), length 98) 74.xxx.xxx.xxx.99999 > 10.10.14.21.52637: [udp sum ok] UDP, length 70 16:01:51.889260 IP (tos 0xb8, ttl 45, id 41288, offset 0, flags [none], proto UDP (17), length 84) 74.xxx.xxx.xxx.99999 > 10.10.14.21.52637: [udp sum ok] UDP, length 56 16:01:51.891505 IP (tos 0xb8, ttl 45, id 52538, offset 0, flags [none], proto UDP (17), length 84) 74.xxx.xxx.xxx.99999 > 10.10.14.21.52629: [udp sum ok] UDP, length 56 16:01:51.918761 IP (tos 0xb8, ttl 45, id 41289, offset 0, flags [none], proto UDP (17), length 74) 74.xxx.xxx.xxx.99999 > 10.10.14.21.52637: [udp sum ok] UDP, length 46 16:01:52.018803 IP (tos 0xb8, ttl 45, id 64823, offset 0, flags [none], proto UDP (17), length 96) 74.xxx.xxx.xxx.99999 > 10.10.14.21.52621: [udp sum ok] UDP, length 68 16:01:52.019751 IP (tos 0xb8, ttl 45, id 52539, offset 0, flags [none], proto UDP (17), length 96) 74.xxx.xxx.xxx.99999 > 10.10.14.21.52629: [udp sum ok] UDP, length 68 16:01:52.021654 IP (tos 0xb8, ttl 45, id 41290, offset 0, flags [none], proto UDP (17), length 96) 74.xxx.xxx.xxx.99999 > 10.10.14.21.52637: [udp sum ok] UDP, length 68 16:01:52.073017 IP (tos 0xb8, ttl 45, id 64824, offset 0, flags [none], proto UDP (17), length 84) 74.xxx.xxx.xxx.99999 > 10.10.14.21.52621: [udp sum ok] UDP, length 56 16:01:52.182993 IP (tos 0xb8, ttl 117, id 2867, offset 0, flags [DF], proto TCP (6), length 509) 157.56.193.38.https > 10.10.14.21.54656: Flags [P.], cksum 0xcbd5 (correct), seq 2920921318:2920921787, ack 4198288936, win 65520, length 469 At the same time on the same, this server creates flows from raw data and send it to NFSEN. The process and syntax involved are: nprobe -n 10.0.4.199:2055 -u 0 -Q 1 -T %IPV4_SRC_ADDR %IPV4_DST_ADDR %IPV4_NEXT_HOP %INPUT_SNMP %OUTPUT_SNMP %IN_PKTS %IN_BYTES %FIRST_SWITCHED %LAST_SWITCHED %L4_SRC_PORT %L4_DST_PORT %TCP_FLAGS %PROTOCOL %SRC_TOS %SRC_AS %DST_AS %IPV4_SRC_MASK %IPV4_DST_MASK --zmq tcp://*:5556 -i eth3 any idea why Tos is not maintained on the transfer from nprobe to nfsen? (only CS6 is maintained). Thanks Oliver Lagni -----Original Message----- From: Oliver Lagni Sent: martedì 28 ottobre 2014 15:21 To: 'nfsen-discuss@lists.sourceforge.net' Subject: RE: Filter TOS with NFSEN Hi all.. About this issue I've just discovered this: On the nprobe server I see with tcpdump packets with TOS on it... I see CS6 (TOS 192) for OSPF for example or HSRP. So I see packet with QoS identifier on it. Same I see on NFSEN (another server). So if in NFSEN I go and query a window time traffic with TOS I see most of flows are CS6/192. If I filter for a specific ip address that I'm sure 100% it is tagget with EF/184 I see TOS 0. I'm sure that EF/184 is there since if I check the packets with TCPDUMP on nprobe I see it. So it looks like nprobe doesn't trust that value and override it. Is it possible? Thanks. -----Original Message----- From: Oliver Lagni Sent: mercoledì 15 ottobre 2014 14:54 To: 'nfsen-discuss@lists.sourceforge.net' Subject: Filter TOS with NFSEN Hi guys, anyone else on this? Original issue is: I can't graph any tos value on NFSEN, despite I see it when I capture traffic on the segment I'm monitoring. Only TOS 0 works . Thanks -----Original Message----- From: nfsen-discuss-requ...@lists.sourceforge.net [mailto:nfsen-discuss-requ...@lists.sourceforge.net] Sent: martedì 7 ottobre 2014 14:32 To: nfsen-discuss@lists.sourceforge.net Subject: Nfsen-discuss Digest, Vol 100, Issue 2 Send Nfsen-discuss mailing list submissions to nfsen-discuss@lists.sourceforge.net To subscribe or unsubscribe via the World Wide Web, visit https://lists.sourceforge.net/lists/listinfo/nfsen-discuss or, via email, send a message with subject or body 'help' to nfsen-discuss-requ...@lists.sourceforge.net You can reach the person managing the list at nfsen-discuss-ow...@lists.sourceforge.net When replying, please edit your Subject line so it is more specific than "Re: Contents of Nfsen-discuss digest..." Today's Topics: 1. Re: Filter TOS with NFSEN (Giles Coochey) 2. Re: Filter TOS with NFSEN (Giles Coochey) ---------------------------------------------------------------------- Message: 1 Date: Tue, 07 Oct 2014 13:29:28 +0100 From: Giles Coochey <gi...@coochey.net> Subject: Re: [Nfsen-discuss] Filter TOS with NFSEN To: nfsen-discuss@lists.sourceforge.net Message-ID: <5433dca8.6050...@coochey.net> Content-Type: text/plain; charset="windows-1252" On 07/10/2014 13:14, Oliver Lagni wrote: > > Hello all, > > I?m setting the DSCP on some traffic going out and getting in on my > firewall. > > With NFSEN I collect traffic from both segments, LAN and WAN Firewall > sides. > > On my firewall I set DSCP to 101110 for real-time traffic and I > clearly see it on Nprobe server on both segments, as soon as I filter > with TCPDump: > > tcpdump -i eth2 -vvv -n ip and ip[1]=0xb8 > > 0xb8 is 184 in HEX.. and I see this on eth2 (WAN) and eth3 (LAN): > > 14:21:23.236494 IP (*tos 0xb8*, ttl 126, id 4388, offset 0, flags > [DF], proto TCP (6), length 450) > > 217.xx.xx.xx.47460 > 64.xx.xx.xx.https: Flags [P.], cksum 0x5af4 > (correct), seq 949:1359, ack 84, win 256, length 410 > > But as soon as I filter on NFSEN with syntax Tos 184 or tos 0xb8 I > don?t see anything. > > Is there any reason? Can someone help me a bit on this? > > I am not sure, but I think the tos value you filter with is the 3 most significant bits, so a value between 0-7 0 = 000xxxxxx 1 = 001xxxxxx 2 = 010xxxxxx 3 = 011xxxxxx 4 = 100xxxxxx 5 = 101xxxxxx 6 = 110xxxxxx 7 = 111xxxxxx So "tos 1" filter matches your priority packets? -- Regards, Giles Coochey, CCNP, CCNA, CCNAS NetSecSpec Ltd +44 (0) 8444 780677 +44 (0) 7584 634135 http://www.coochey.net http://www.netsecspec.co.uk gi...@coochey.net -------------- next part -------------- An HTML attachment was scrubbed... -------------- next part -------------- A non-text attachment was scrubbed... Name: smime.p7s Type: application/pkcs7-signature Size: 6454 bytes Desc: S/MIME Cryptographic Signature ------------------------------ Message: 2 Date: Tue, 07 Oct 2014 13:31:55 +0100 From: Giles Coochey <gi...@coochey.net> Subject: Re: [Nfsen-discuss] Filter TOS with NFSEN To: nfsen-discuss@lists.sourceforge.net Message-ID: <5433dd3b.8090...@coochey.net> Content-Type: text/plain; charset="windows-1252" On 07/10/2014 13:29, Giles Coochey wrote: > On 07/10/2014 13:14, Oliver Lagni wrote: >> >> On my firewall I set DSCP to 101110 for real-time traffic and I >> clearly see it on Nprobe server on both segments, as soon as I filter >> with TCPDump: >> >> > I am not sure, but I think the tos value you filter with is the 3 most > significant bits, so a value between 0-7 > > 0 = 000xxxxxx > 1 = 001xxxxxx > 2 = 010xxxxxx > 3 = 011xxxxxx > 4 = 100xxxxxx > 5 = 101xxxxxx > 6 = 110xxxxxx > 7 = 111xxxxxx > > So "tos 1" filter matches your priority packets? Argh... binary, 0xb8 should be "tos 5" > -- > Regards, > > Giles Coochey, CCNP, CCNA, CCNAS > NetSecSpec Ltd > +44 (0) 8444 780677 > +44 (0) 7584 634135 > http://www.coochey.net > http://www.netsecspec.co.uk > gi...@coochey.net -- Regards, Giles Coochey, CCNP, CCNA, CCNAS NetSecSpec Ltd +44 (0) 8444 780677 +44 (0) 7584 634135 http://www.coochey.net http://www.netsecspec.co.uk gi...@coochey.net -------------- next part -------------- An HTML attachment was scrubbed... -------------- next part -------------- A non-text attachment was scrubbed... Name: smime.p7s Type: application/pkcs7-signature Size: 6454 bytes Desc: S/MIME Cryptographic Signature ------------------------------ ------------------------------------------------------------------------------ Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk ------------------------------ _______________________________________________ Nfsen-discuss mailing list Nfsen-discuss@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/nfsen-discuss End of Nfsen-discuss Digest, Vol 100, Issue 2 ********************************************* ------------------------------------------------------------------------------ _______________________________________________ Nfsen-discuss mailing list Nfsen-discuss@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/nfsen-discuss