Hi Jed,

> Am 26.06.2015 um 03:09 schrieb Jed Clear <[email protected]>:
> 
> I haven't explored iptables in bridge/layer 2 mode, but there is no 
> fundamental reason you can't packet sniff or firewall traffic in bridge mode. 
> The traffic has to pass through your kernel. 
> 
Yep, I was actually wrong here! The solution is to use the -t switch in order 
to use the ‚filter‘ table. So for example, the following line would block all 
outgoing traffic to Soekris.com <http://soekris.com/> from all devices which 
are behind the bridge:
iptables -t filter -A FORWARD -d 192.240.163.67 -j DROP
It’s really quite easy, except that you probably wouldn’t want that particular 
firewall rule!

> If you were asking about FreeBSD and ipfw,  I'd say yes, just look into the 
> layer 2 filter points.  So I'd recommend digging into the iptables 
> documentation for something similar.  Also not familiar with snort, but with 
> tcpdump, I'd specify the interface and I'm pretty sure it would work as it is 
> capturing at layer 2 (or am I thinking of Wireshark?).

Actually, I installed tshark, the CLI version of Wireshark, on the Net6501. I 
could then sniff on the br0 interface and the resulting output looks promising, 
seems like everything got sniffed pretty nicely!
Robin
_______________________________________________
Soekris-tech mailing list
[email protected]
http://lists.soekris.com/mailman/listinfo/soekris-tech

Reply via email to