Brief

In this document we could help you to setup FastNetMon in sFlow, Netflow / IPFIX or mirror mode. To start this step you should have installed FastNetMon.

Common steps

You need to finish these steps for all available capture methods (sFlow, NetFlow, IPFIX, Mirror).

Please enumerate all your IPv4 and IPv6 networks in CIDR form:

sudo fcli set main networks_list 11.22.33.0/22
sudo fcli set main networks_list beef::1/64
sudo fcli commit

We need this information to properly detect traffic’s direction.

If you have big number of networks and they change frequently we have options to read network list directly from BGP peering connection, please try this guide.

Enable traffic capture

FastNetMon supports variety of traffic telemetry protocols. Usually, routers support Netflow or IPFIX. Switches do support sFlow. In case if none of these protocols are supported you may rely on port mirror.

How to check that it’s working?

The best way to confirm that FastNetMon calculates traffic correctly is to run command line client:

fastnetmon_client

It will show window like this:

Alternatively you can use command line tool fcli to see total traffic for IPv4 and IPv6 protocols:

sudo fcli show total_traffic_counters
sudo fcli show total_traffic_counters_v6

If telemetry was setup correctly you should see non zero counters for incoming and outgoing traffic.

Total traffic counter types:

  • Other traffic – “nor source nor destination is known to be part of our list of networks”. Also, it may be a non-IP (for example, ARP) traffic too
  • Internal traffic – traffic where source and destination both belong to your list of networks. FastNetMon does not trigger DDoS alerts for such traffic at all

If you see significant amount of other traffic then it may be good idea to enable following option temporarily to dump all flows classified as other to /var/log/fastnetmon/fastnetmon.log to find all networks you’ve missed during setup:

sudo fcli set main dump_other_traffic true
sudo fcli commit

You could check load for all your IPv4 and IPv6 networks this way:

sudo fcli show network_counters
sudo fcli show network_counters_v6

To see top 10 IPv4 or IPv6 hosts in your network you can this command

sudo fcli show host_counters bytes outgoing
sudo fcli show host_counters_v6 bytes outgoing

To get traffic for specific IPv4 or IPv6 hosts you can use this command:

sudo fcli show single_host_counters 10.1.2.3
sudo fcli show single_host_counters_v6 beef::1

Detection modes

FastNetMon offers multiple ways to defend your network from DDoS attacks:

  • Blackhole mode, in this mode FastNetMon blocks attacked host using BGP Blackhole and effectively unplugs it from the Internet to move malicious traffic away from your network and keep uptime of it.
  • Total hostgroup logic offers ability to create BGP announces or alerts when total traffic for group of networks exceeds defined value. It may be useful as defense against carpet bombing attack and as reliable trigger for traffic diversion to DDoS scrubbing centers
  • BGP Flow spec based mitigation, in this mode FastNetMon can isolate only malicious traffic and filter out it using your routers.
  • Remote host blocking offers an option to block attackers using BGP protocol.

24/7 Tech Support

support@fastnetmon.com

Email Us

sales@fastnetmon.com