My Juniper SRX devices are configured to send packet captures to a Linux server for further analysis. I have the Linux server exporting its share via NFS which I mount on my PC, that allows me to then browse through the packet captures of attacks using my PC directly and open them in Wireshark.
Packet Capture Server Setup
My packet capture server is running Debian Linux. These instructions will worth for other distro’s with some small modifications.
Prepare the Host
Install the required packages with
apt-get install python2.7 python-pip python-dpkt
You will also need to install the
twisted network engine which can be installed by using
pip install twisted
Packet Capture Daemon
The actual daemon that listens to collect the packet captures makes use of the “SRX PCAP Receiver” script, originally sourced from GitHub user craigdods. I have created a fork of this available here. The fork has some extra scripts added for a systemd service file and a cronjob to clean up old packet captures.
All packet captures on my host are stored in /captures (this can be a separate disk if you desire). If you choose to install it in a different directory, you will need to change the paths in the systemd init script, cron tab file and any other commands provided below.
Create the captures directory and check out the repo from GitHub:
mkdir /captures cd /captures git clone firstname.lastname@example.org:sysadminblog/SRX_PCAP_Receiver.git .
Add the systemd service and allow it to start on boot:
cp /captures/packetcap.service /etc/systemd/system/packetcap.service systemctl daemon-reload systemctl enable packetcap.service
Verify that you can run the packet capture script:
cd /captures && /captures/srx_pcap_receiver.py
If you do not get any errors from running that command, use
Control + C to exit.
Start the packet capture service:
service packetcap start
Add the cron to clean up old packet captures:
cp /captures/packetcap.cron /etc/cron.d/packetcap
You can now send the packet captures to 2050 on this server from the SRX device.
If you want the packet captures to be available via NFS, follow these steps.
- Install the NFS server packages:
apt-get install nfs-common nfs-kernel-server
- Configure the NFS server to export the share. For this example, my PC IP is 192.168.34.231. You must replace the IP below with the source that will be mounting the NFS share:
cat << EOF >> /etc/exports /captures/Juniper_IDP_PCAP_Storage 192.168.34.231(ro,sync,fsid=0,no_subtree_check,no_root_squash) EOF
- Export the share:
The share is now exported. The directory can be mounted as usual, eg. for Windows hosts (with the NFS feature installed), use
mount \\linux-host\captures\Juniper_IDP_PCAP_Storage G:.
The SRX device needs to be configured to send the packet captures for IDP attacks to the packet capture server.
The packet capture host needs to be configured in the
set security idp sensor-configuration packet-log source-address 'SOURCE-IP' set security idp sensor-configuration packet-log host 'PACKETCAP-SERVER-IP' set security idp sensor-configuration packet-log host port 2050
For any IDP rules that you have configured that you would like to have packets captured for, you must set the
packet-log notification action.
As an example, for the rule
Packet-Cap in the IDP policy
set security idp idp-policy Default.Policy rulebase-ips rule Packet-Cap then notification packet-log pre-attack 5 set security idp idp-policy Default.Policy rulebase-ips rule Packet-Cap then notification packet-log post-attack 20 set security idp idp-policy Default.Policy rulebase-ips rule Packet-Cap then notification packet-log post-attack-timeout 5
Once an attack with the
packet-log action has been triggered, you should be able to browse to
/captures/Juniper_IDP_PCAP_Storage on the packet capture server and see the available packet captures.