Dashboard : Dashboard > Packet Monitor

Configuring Packet Monitor
You can access the packet monitor tool on the Dashboard > Packet Monitor page of the SonicOS management interface. There are six main areas of configuration for packet monitor, one of which is specifically for packet mirror. The following sections describe the configuration options, and provide procedures for accessing and configuring the filter settings, log settings, and mirror settings:
Configuring General Settings
This section describes how to configure packet monitor general settings, including the number of bytes to capture per packet and the buffer wrap option. You can specify the number of bytes using either decimal or hexadecimal, with a minimum value of 64. The buffer wrap option enables the packet capture to continue even when the buffer becomes full, by overwriting the buffer from the beginning.
To configure the general settings, perform the following steps:
1
Navigate to the Dashboard > Packet Monitor page.
2
Click Configure. The Packet Monitor Configuration dialog displays.
3
In the General Settings section, in the Number of Bytes To Capture (per packet) field, enter the number of bytes to capture from each packet. The minimum value is 64, the default value is 1520. You can enter this number as a hexadecimal figure.
4
To continue capturing packets after the buffer fills up, select the Wrap Capture Buffer Once Full checkbox. Selecting this option causes packet capture to start writing captured packets at the beginning of the buffer again after the buffer fills. This option has no effect if FTP server logging is enabled on the Logging tab because the buffer is automatically wrapped when FTP is enabled.
5
In the Exclude Filter section, select the Exclude encrypted GMS traffic to prevent capturing or mirroring of encrypted management or syslog traffic to or from SonicWALL GMS. This setting only affects encrypted traffic within a configured primary or secondary GMS tunnel. GMS management traffic is not excluded if it is sent via a separate tunnel.
6
Use the Exclude Management Traffic settings to prevent capturing or mirroring of management traffic to the appliance. Select the checkbox for each type of traffic to exclude:
HTTP/HTTPS (selected by default)
If management traffic is sent via a tunnel, the packets are not excluded.
7
Use the Exclude Syslog Traffic to settings to prevent capturing or mirroring of syslog traffic to the logging servers. Select the checkbox for each type of server to exclude:
8
9
Use the Exclude Internal Traffic for settings to prevent capturing or mirroring of internal traffic between the firewall and its High Availability partner or a connected SonicPoint. Select the checkbox for each type of traffic to exclude:
HA (selected by default)
10
To save your settings and exit the Packet Monitor Configuration dialog, click OK.
Configuring Monitoring Based on Firewall Rules
The Packet Monitor and Flow Reporting features allow traffic to be monitored based on firewall rules for specific inbound or outbound traffic flows. This feature set is enabled by choosing to monitor flows in the Firewall > Access Rules area of the SonicOS management interface.
To configure the general settings, perform the following steps:
1
Navigate to the Firewall > Access Rules page
2
Click the Configure icon for the rule(s) on which to enable packet monitoring or flow reporting. The Edit Rule dialog displays.
3
Select the Enable packet monitor checkbox to send packet monitoring statistics for this rule.
4
Click the OK button to save your changes.
NOTE: Further monitor filter settings are required on the Dashboard > Packet Monitor page to enable monitoring based on firewall rules.
Configuring Monitor Filter Settings
All filters set on this page are applied to both packet capture and packet mirroring.
To configure Monitor Filter settings, complete the following steps:
1
Navigate to the Dashboard > Packet Monitor page.
2
Click Configure. The Packet Monitor Configuration dialog displays.
3
Click the Monitor Filter tab.
4
5
Interface Name(s) - Specify the name(s) of the interface(s) on which to perform packet capture. You can specify up to ten interfaces separated by commas. The specified interface names should be the same as those listed in the Network > Interface page; for example:
To configure all interfaces except the one(s) specified, use a negative value; for example: !X0, or !LAN.
Ether Type(s) - Specify the name of the Ethernet type(s) on which to perform filtering of the captured packets. You can specify up to ten Ethernet types separated by commas. This option is not case-sensitive. Currently, the following Ethernet types are supported: ARP (arp), IP (ip), PPPoE-SES, and PPPoE-DIS. The latter two can be specified by PPPoE alone.
For example, to capture all supported types, you could enter: ARP, ip, PPPOE. You can use one or more negative values to capture all Ethernet types except those specified; for example: !ARP, !PPPoE.
You can also use hexadecimal values to represent the Ethernet types, or mix hex values with the standard representations; for example: ARP, 0x800, ip. Normally you would only use hex values for Ethernet types that are not supported by acronym in SonicOS. See Supported Packet Types .
IP Type(s) - Specify the name(s) of the IP packet type(s) on which to perform packet capture. You can specify up to ten IP types separated by commas. This option is not case-sensitive. The following IP types are supported: TCP, UDP, ICMP, GRE, IGMP, AH, ESP.
You can use one or more negative values to capture all IP types except those specified; for example: !TCP, !UDP.
You can also use hexadecimal values to represent the IP types, or mix hex values with the standard representations; for example: TCP, 0x1, 0x6. See Supported Packet Types .
Source IP Address(es) - Specify the source IP address(es) on which to perform packet capture.
Source Port(s) - Specify the source port(s) on which to perform packet capture.
Destination IP Address(es) - Specify the destination IP address(es) on which to perform packet capture.
Destination Port(s) - Specify the destination port address(es) on which to perform packet capture.
Enable Bidirectional Address and Port Matching - Select this option to match IP addresses and/or ports specified in the above source and/or destination fields against both the source and/or destination fields in each packet. This option is selected by default.
Forwarded packets only - Select this option to monitor any packets forwarded by the firewall.
Consumed packets only - Select this option to monitor all packets consumed by internal sources within the firewall.
Dropped packets only - Select this option to monitor all packets dropped at the perimeter.
6
Configuring Display Filter Settings
This section describes how to configure Packet Monitor display filter settings. The values you provide here are compared to corresponding fields in the captured packets, and only those packets that match are displayed. These settings apply only to the display of captured packets on the management interface and do not affect packet mirroring.
To configure Packet Monitor display filter settings, complete the following steps:
1
Navigate to the Dashboard > Packet Monitor page.
2
Click Configure. The Packet Monitor Configuration dialog displays.
3
Click the Display Filter tab.
4
Interface Name(s) - Specify the name(s) of the interface(s) on which to perform packet capture. You can specify up to ten interfaces separated by commas. The specified interface names should be the same as those listed in the Network > Interface page; for example:
To configure all interfaces except the one(s) specified, use a negative value; for example: !X0, or !LAN.
Ether Type(s) - Specify the name of the Ethernet type(s) on which to perform filtering of the captured packets. You can specify up to ten Ethernet types separated by commas. This option is not case-sensitive. Currently, the following Ethernet types are supported: ARP (arp), IP (ip), PPPoE-SES, and PPPoE-DIS. The latter two can be specified by PPPoE alone.
For example, to capture all supported types, you could enter: ARP, ip, PPPOE. You can use one or more negative values to capture all Ethernet types except those specified; for example: !ARP, !PPPoE.
You can also use hexadecimal values to represent the Ethernet types, or mix hex values with the standard representations; for example: ARP, 0x800, ip. Normally you would only use hex values for Ethernet types that are not supported by acronym in SonicOS. See Supported Packet Types .
IP Type(s) - Specify the name(s) of the IP packet type(s) on which to perform packet capture. You can specify up to ten IP types separated by commas. This option is not case-sensitive. The following IP types are supported: TCP, UDP, ICMP, GRE, IGMP, AH, ESP.
You can use one or more negative values to capture all IP types except those specified; for example: !TCP, !UDP.
You can also use hexadecimal values to represent the IP types, or mix hex values with the standard representations; for example: TCP, 0x1, 0x6. See Supported Packet Types .
Source IP Address(es) - Specify the source IP address(es) on which to perform packet capture.
Source Port(s) - Specify the source port(s) on which to perform packet capture.
Destination IP Address(es) - Specify the destination IP address(es) on which to perform packet capture.
Destination Port(s) - Specify the destination port address(es) on which to perform packet capture.
Enable Bidirectional Address and Port Matching - Select this option to match IP addresses and/or ports specified in the above source and/or destination fields against both the source and/or destination fields in each packet. This option is selected by default.
Forwarded - To display captured packets that the firewall has forwarded, select this checkbox.
Generated - To display captured packets that the firewall has generated, select this checkbox.
Consumed - To display captured packets that the firewall has consumed, select this checkbox.
Dropped - To display captured packets that the firewall has dropped, select this checkbox.
5
Configuring Logging
This section describes how to configure Packet Monitor logging settings. These settings provide a way to configure automatic logging of the capture buffer to an external FTP server. When the buffer fills up, the packets are transferred to the FTP server. The capture continues without interruption.
If you configure automatic FTP logging, this supersedes the setting for wrapping the buffer when full. With automatic FTP logging, the capture buffer is effectively wrapped when full, but you also retain all the data rather than overwriting it each time the buffer wraps.
Topics:
Configuring Logging Settings
To configure logging settings, perform the following steps:
1
Navigate to the Dashboard > Packet Monitor page.
2
Click Configure. The Packet Monitor Configuration dialog displays.
3
Click the Logging tab.
4
In the FTP Server IP Address field, enter the IP address of the FTP server where captured packets are to be logged.
5
In the Login ID field, enter the login name that the firewall should use to connect to the FTP server. The default value is admin.
6
In the Password field, enter the password that the firewall should use to connect to the FTP server. The default value is password.
7
In the Directory Path field, enter the directory path for the logged files. The captured files are written to this directory location at the FTP server relative to the default FTP root directory. The default value is captures.
Examples of file names for the different formats:
libcap format, files are named packet-log--<>.cap, where the <> contains a run number and date including hour, month, day, and year. For example, packet-log--3-22-08292006.cap.
HTML format, file are named packet-log_h-<>.html, where the <> contains a run number and date including hour, month, day, and year. For example: packet-log_h-3-22-08292006.html.
8
To enable automatic logging of the capture file to a remote FTP server, select the Log To FTP Server Automatically checkbox. Captured files are named (where the <> contains a run number and date including hour, month, day, and year):
packet-log-<>.cap for libcap format; for example packet-log_3-22-08292006.cap.
packet-log-<>.html for HTML format; for example packet-log_3-22-08292006.html.
This option is not selected by default.
NOTE: You must specify an FTP server address in the FTP Server IP Address field.
9
To enable transfer of the file in HTML format as well as libcap format, select the Log HTML File Along With .cap File (FTP). This option is selected by default.
10
To test the connection to the FTP server and transfer the capture buffer contents to it, click the Log Now. In this case, the file name will contain an F. For example, packet-log-F-3-22-08292006.cap or packet-log_h-F-3-22-08292006.html.
11
Restarting FTP Logging
If automatic FTP logging is off, either because of a failed connection or simply disabled, you can restart it in Configure > Logging.
To restart FTP logging:
1
Navigate to the Dashboard > Packet Monitor page.
2
Click Configure. The Packet Monitor Configuration dialog displays.
3
click the Logging tab.
4
5
To change the FTP logging status on the Dashboard > Packet Monitor page to active, select the Log To FTP Server Automatically checkbox.
6
7
Configuring Advanced Monitor Filter Settings
This section describes how to configure monitoring for packets generated by the firewall and for intermediate traffic.
1
Navigate to the Dashboard > Packet Monitor page.
2
Click Configure. The Packet Monitor Configuration dialog displays.
3
Click the Advanced Monitor Filter tab.
4
To capture packets generated by the firewall, select the Monitor Firewall Generated Packets (This will bypass interface filter) checkbox. This option is not selected by default.
Even when other monitor filters do not match, this option ensures that packets generated by the firewall are captured. This includes packets generated by such protocols as HTTP(S), L2TP, DHCP servers, PPP, PPPOE, and routing. Captured packets are marked with s in the incoming interface area when they are from the system stack. Otherwise, the incoming interface is not specified.
5
To capture intermediate packets generated by the firewall as a result of various policies, select the Monitor Intermediate Packets checkbox. Included are such packets as intermediate encrypted packets, IP help-generated packets, multicast packets that are replicated, and those generated as a result of fragmentation or reassembly.
Selecting this checkbox enables, but does not select, the subsequent checkboxes for monitoring specific types of intermediate traffic. This option is not selected by default.
6
Monitor intermediate multicast traffic – For multicast traffic.
Monitor intermediate IP helper traffic – For replicated IP Helper packets.
Monitor intermediate reassembled traffic – For reassembled IP packets.
Monitor intermediate fragmented traffic – For packets fragmented by the firewall.
Monitor intermediate remote mirrored traffic – For remote mirrored packets after de-encapsulation.
Monitor intermediate IPsec traffic – For IPSec packets after encryption and decryption.
Monitor intermediate SSL decrypted traffic – For SSL decrypted packets.
Monitor intermediate decrypted LDAP over TLS packets – For decrypted LDAP over TLS (LDAPS) packets. The packets are marked with ldp in the ingress/egress interface fields and have dummy Ethernet, IP, and TCP headers with some inaccurate fields. The LDAP server port is set to 389 so an external capture analysis program decode it as LDAP. Passwords in captured LDAP bind requests are obfuscated.
Monitor intermediate decrypted Single Sign On agent messages – For decrypted messages to or from the SSO authentication agent. The packets are marked with sso in the ingress/egress interface fields and have dummy Ethernet, IP, and TCP headers with some inaccurate fields.
7
Configuring Mirror Settings
This section describes how to configure Packet Monitor mirror settings. Mirror settings provide a way to send packets to a different physical port of the same firewall or to send packets to, or receive them from, a remote SonicWALL firewall.
To configure mirror settings, perform the following steps:
1
Navigate to the Dashboard > Packet Monitor page.
2
Click Configure. The Packet Monitor Configuration dialog displays.
3
Click the Mirror tab.
4
Under Mirror Settings, enter the desired maximum rate for mirror data into the Maximum mirror rate (in kilobits per second) field. If this rate is exceeded during mirroring, the excess packets are not mirrored but counted as skipped packets. This rate applies to mirroring both locally to an interface or to a remote firewall. The default and minimum value is 100 kbps, and the maximum is 1 Gbps.
5
Select the Mirror only IP packets checkbox to prevent mirroring of any non-IP packets, such as ARP or PPPoE. If selected, this option overrides any non-IP Ether types entered in the Ether Type(s) field on the Monitor Filter tab.
6
Under Local Mirror Settings, select the destination interface for locally mirrored packets in the Mirror filtered packets to Interface drop-down menu. The default is None.
7
Under Remote Mirror Settings (Sender), in the Mirror filtered packets to remote Sonicwall firewall (IP Address) field, enter the IP address of the remote SonicWALL where mirrored packets are sent. Packets are encapsulated and set to the remote device (specified IP address).
8
In the Encrypt remote mirrored packets via IPSec (preshared key-IKE) field, enter the c pre-shared key to be used to encrypt traffic when sending mirrored packets to the remote firewall. Configuring this field enables an IPSec transport mode tunnel between this appliance and the remote firewall. This pre-shared key is used by IKE to negotiate the IPSec keys.
9
Under Remote Mirror Settings (Receiver), in the Receive mirrored packets from remote Sonicwall firewall (IP Address) field, enter the IP address of the remote appliance that receives mirrored packets. Packets are decapsulated and sent either to a local buffer or out of another interface as specified in the following options.
10
In the Decrypt remote mirrored packets via IPSec (preshared key-IKE) field, enter the previously configured pre-shared key to be used to encrypt/decrypt traffic when receiving mirrored packets from the remote firewall. This pre-shared key is used by IKE to negotiate the IPSec keys.
11
To mirror received packets to another interface on the local SonicWALL, select the interface from the Send received remote mirrored packets to Interface drop-down menu. The default is None.
12
To save all remote mirrored packets in the local capture buffer, select the Send received remote mirrored packets to capture buffer checkbox. This option is independent of sending mirrored packets to another interface, and both can be enabled if desired.
13