On 8/5/16 7:19 AM, Lamar Owen wrote:
On 07/30/2016 06:35 PM, ToddAndMargo wrote:
I am looking to do network discovery. Basically, everything
on the interface, regardless of what network it belongs to
or if even has an ip assigned.  Like AutoScan Network, only
not abandoned.

I have a dedicated install of NetworkSecurityToolkit (NST) on a box connected to two ports on one of our core switches. One port is the admin port that NST serves its web GUI on; the second port is a capture-only port and connects to a SPAN port on the core switch (Cisco terminology, as it's a Cisco 7609). I set up the SPAN to redirect traffic for the ports and/or VLANs I'm interested in looking at, and then capture all the traffic (I capture all traffic then filter it out). Not as clean as some other solutions, but it does get everything.

I got to thinking about this some more and Lamar, you just triggered a thought... There IS a technique used by large organizations. Cisco invented this "thing" called netflow. On my linux systems I have a kernel module called ipt_NETFLOW (https://sourceforge.net/projects/ipt-netflow/). It sends netflow (tcp/ip connection) records to a netflow collector. Windows can export netflow too (http://www.flowtraq.com/corporate/product/flow-exporter/).

I use ntop as the collector on Linux and it seems to have versions for OS X and windows these days too, but there are many netflow collectors. Many are free (solarwinds is common).

This is the big-boy way of doing this.

For full disclosure, I pay my bills supporting one of the proprietary netflow collection/analysis tools... No, I won't name the tool.

Reply via email to