1
0
Fork 0
mirror of https://github.com/pavel-odintsov/fastnetmon synced 2024-06-10 06:16:19 +02:00
mirror of the fastnetmon repo with rewritten history
Go to file
Pavel Odintsov 3b39dbffd8 Improved readme information 2022-02-10 13:39:04 +00:00
.circleci Split fastnetmon_install.pl into two scripts and moved all source compilation logic into fastnetmon_build.pl 2022-02-09 14:42:21 +00:00
.github Added funding page 2019-05-27 21:13:42 +01:00
debian debian: Bump Standards-Version to 4.0.0 2017-07-27 11:52:51 +02:00
docs Added image for deployment scenarios 2019-04-16 08:16:12 +01:00
src Switched to using only latin symbols for all commands output to simplify error tracking 2022-02-10 13:39:04 +00:00
.gitignore issues/682 v4 (#727) 2018-08-02 23:55:01 +01:00
.gitmodules Juniper Implementation (#747) 2018-12-06 17:33:42 +00:00
.travis.yml Split fastnetmon_install.pl into two scripts and moved all source compilation logic into fastnetmon_build.pl 2022-02-09 14:42:21 +00:00
HAPPY_CUSTOMERS.md Renamed and fixed happy customers. REG.RU switched to different tool for this task 2017-12-03 22:05:13 +00:00
LICENSE Fixed bunch of paths to old versions of FNM 2017-12-03 21:22:11 +00:00
README.md Improved readme information 2022-02-10 13:39:04 +00:00
THANKS.md Moved thanks file to top level fodler 2017-12-03 22:04:00 +00:00

logo

Community Edition

FastNetMon - A high performance DoS/DDoS load analyzer built on top of multiple packet capture engines (NetFlow, IPFIX, sFlow, AF_PACKET, Netmap, PCAP).

What do we do?

We detect hosts in the deployed network sending or receiving large volumes of traffic, packets/bytes/flows, per second and perform a configurable action to handle that event. These configurable actions include notifying you, switching off the server, or blackholing the client.

Flow is one or more ICMP, UDP, or TCP packets which can be identified via their unique src IP, dst IP, src port, dst port, and protocol fields.

Integration with flow systems

At a very high level integration with FastNetMon is fairly simple. In both cases the work flow is the same and the main difference being the port numbers provided. The port numbers are configurable.

sFlow

Configure the IP of the server running FastNetMon using port 6343. This port number is configurable.

Netflow

Configure the IP of the server running FastNetMon using port 2055. This port number is configurable.

License: GPLv2

Official mirror at GitLab

Project

Official support groups:

Follow us at social media:

Supported packet capture engines

  • NetFlow v5, v9
  • IPFIX
  • sFlow v4, v5
  • PCAP
  • AF_PACKET
  • Netmap
  • SnabbSwitch (experimental)
  • PF_RING / PF_RING ZC (obsoleted, not recommented, please use AF_PACKET instead)

You can check out the comparison table for all available packet capture engines.

Complete integration with the following vendors

Features

  • Detects DoS/DDoS in as little as 1-2 seconds
  • Scales up to terabits on single server (sFlow, Netflow, IPFIX) or to 40G + in mirror mode
  • Trigger block/notify script if an IP exceeds defined thresholds for packets/bytes/flows per second
  • Complete support for most popular attack types
  • Thresholds can be configured per-subnet basis with the hostgroups feature
  • Announce blocked IPs via BGP to routers with ExaBGP or GoBGP
  • Full integration with Graphite and InfluxDB
  • API (available in master branch only)
  • Redis integration
  • MongoDB integration
  • Netmap support (wire speed processing; only Intel hardware NICs or any hypervisor VM type)
  • Filter NetFlow v5 flows or sFlow packets with LUA scripts (useful for excluding particular ports)
  • Supports L2TP decapsulation, VLAN untagging in mirror mode
  • Complete plug-in support
  • Capture attack fingerprints in PCAP format
  • Experimental BGP Flow Spec support, RFC 5575

Running Fastnetmon

Supported platforms

  • Linux (Debian, CentOS, Ubuntu), x86_64 only
  • FreeBSD: official port.

Hardware requirements

  • At least 1 GB of RAM

Router integration instructions

Distributions supported

Screenshots

Main program:

Main screen image

Example CPU load on Intel i7-2600 with Intel X540/82599 NIC at 400Kpps load: Cpu consumption

Example deployment scheme: Network diagramm

Example of notification email about detected attack:

Author: Pavel Odintsov