Hi,
I am looking to get Cisco FNF (Flexible Netflow) and elastic netflow to play nice with me.
I don't know if I should report this as a "bug"?
When using FNF and get direction on internal flows it feels like the signal detection rule:
"SSH (Secure Shell) to the Internet"
This fires on internal » internal outbound traffic.
192.168.1.10 » 192.168.2.10:22
network.transport: tcp and destination.port:22 and ( network.direction: outbound or ( source.ip: (10.0.0.0/8 or 172.16.0.0/12 or 192.168.0.0/16) and not destination.ip: (10.0.0.0/8 or 172.16.0.0/12 or 192.168.0.0/16) ))
Is this by design, or should it be something like?:
network.transport: tcp and destination.port:22 and ( network.direction: outbound and not destination.ip: (10.0.0.0/8 or 172.16.0.0/12 or 192.168.0.0/16) or ( source.ip: (10.0.0.0/8 or 172.16.0.0/12 or 192.168.0.0/16) and not destination.ip: (10.0.0.0/8 or 172.16.0.0/12 or 192.168.0.0/16)))
or (without outbound)
network.transport: tcp and destination.port:22 and source.ip: (10.0.0.0/8 or 172.16.0.0/12 or 192.168.0.0/16) and not destination.ip: (10.0.0.0/8 or 172.16.0.0/12 or 192.168.0.0/16))
--
Regards Falk