fastnetmon rebooted - based on one of the latest fastnetmon forks
Go to file
surtur 2d60dd48d6
All checks were successful
continuous-integration/drone/push Build is passing
apply CMakeLists patch for ultimate clean-up
* switch to c++17 standard
* edit library and header paths to include system folders
* disable libicu
* fix trailing whitespace

* update .drone.yml
2021-05-05 01:33:18 +02:00
.circleci Bump version to 1.2.1 for development release 2021-02-05 17:35:43 +00:00
.github Improved issue template 2020-12-22 22:08:40 +00:00
debian debian: Bump Standards-Version to 4.0.0 2017-07-27 11:52:51 +02:00
docs Added image for deployment scenarios 2019-04-16 08:16:12 +01:00
src apply CMakeLists patch for ultimate clean-up 2021-05-05 01:33:18 +02:00
.drone.yml apply CMakeLists patch for ultimate clean-up 2021-05-05 01:33:18 +02:00
.gitignore issues/682 v4 (#727) 2018-08-02 23:55:01 +01:00
.gitmodules Juniper Implementation (#747) 2018-12-06 17:33:42 +00:00
buildpls WIP: add a little build helper script [skip ci] 2021-04-09 02:48:47 +02:00
HAPPY_CUSTOMERS.md Renamed and fixed happy customers. REG.RU switched to different tool for this task 2017-12-03 22:05:13 +00:00
LICENSE Fixed bunch of paths to old versions of FNM 2017-12-03 21:22:11 +00:00
README.md Added GoBGP recommendation status 2021-01-27 19:04:39 +00:00
THANKS.md Moved thanks file to top level fodler 2017-12-03 22:04:00 +00:00

logo

Community Edition

FastNetMon - A high performance DoS/DDoS load analyzer built on top of multiple packet capture engines (NetFlow, IPFIX, sFlow, AF_PACKET, Netmap, PCAP).

What do we do?

We detect hosts in the deployed network sending or receiving large volumes of traffic, packets/bytes/flows, per second and perform a configurable action to handle that event. These configurable actions include notifying you, switching off the server, or blackholing the client.

Flow is one or more ICMP, UDP, or TCP packets which can be identified via their unique src IP, dst IP, src port, dst port, and protocol fields.

Project

Supported packet capture engines

  • NetFlow v5, v9
  • IPFIX
  • sFlow v5
  • PCAP
  • AF_PACKET
  • Netmap
  • PF_RING / PF_RING ZC (available only for CentOS 6 for compatibiliy, otherwise use AF_PACKET)

You can check out the comparison table for all available packet capture engines.

Official support groups:

Follow us at social media:

Complete integration with the following vendors

Features

  • Detects DoS/DDoS in as little as 1-2 seconds
  • Scales up to terabits on single server (sFlow, Netflow, IPFIX) or to 40G + in mirror mode
  • Trigger block/notify script if an IP exceeds defined thresholds for packets/bytes/flows per second
  • Complete support for most popular attack types
  • Thresholds can be configured per-subnet basis with the hostgroups feature
  • Email notifications about detected attack
  • IPv6 support for mirror, Netflow and IPFIX modes
  • Announce blocked IPs via BGP to routers with ExaBGP or GoBGP (recommended)
  • Full integration with Graphite and InfluxDB
  • API
  • Redis integration
  • MongoDB integration
  • Netmap support (wire speed processing; only Intel hardware NICs or any hypervisor VM type)
  • Supports L2TP decapsulation, VLAN untagging in mirror mode
  • Complete plug-in support
  • Capture attack fingerprints in PCAP format
  • Experimental BGP Flow Spec support, RFC 5575

Running FastNetMon

Hardware requirements

  • At least 1 GB of RAM

Installation

Router integration instructions

Screenshots

Main screen image

Example deployment scheme

Network diagramm