Packet Sniffers

Contents

Overview

Packet Sniffers are a type of Passive Service. Rather than opening up a TCP port and actively listening for requests, the Packet Sniffer passively reads raw data packets off the network interface. The Sniffer assembles these packets into complete messages that can then be passed into an associated policy.

Because the Packet Sniffer operates passively (i.e. does not listen on a TCP port) and, therefore, completely transparently to the client, it is most useful for monitoring and managing Web Services. For example, the Sniffer can be deployed on a machine running a Web Server acting as a container for Web Services. Assuming that the Web Server is listening on TCP port 80 for traffic, the Packet Sniffer can be configured to read all packets destined for port 80 (or any other port, if necessary). The packets can then be marshalled into complete HTTP/SOAP messages by the Sniffer and passed into a policy that logs the message to a database, for example.

Important Note:
Please note that on Linux and Solaris platforms, the Enterprise Gateway must be started by the root user in order to gain access to the raw packets.

Configuration

Since Packet Sniffers are mainly for use as passive monitoring agents, they are usually created within their own HTTP Service Group. So, for example, a new Service Group can be created for this purpose by right-clicking on the Process, selecting the Add HTTP Services menu option, and then entering "Packet Sniffer Group" on the HTTP Services dialog.

We can then add a Relative Path Service to this Group by right-clicking on the "Packet Sniffer Group" and selecting the Add Relative Path menu option. Enter a path in the field provided and select the policy that you want to dispatch messages to when the Packet Sniffer detects a request for this path (after it assembles the packets). So, for example, if the Relative Path is configured as "/a", and the Packet Sniffer assembles packets into a request for this path, the request will be dispatched to the policy selected in the Relative Path Service.

Finally, we can add the Packet Sniffer itself by right-clicking on the "Packet Sniffer Group" node, selecting Packet Sniffer, and then the Add menu option. Complete the following fields on the Packet Sniffer dialog:

Device to Monitor:
Enter the name or identifier of the network interface that the Packet Sniffer will monitor. The default entry here is "any", but it is important to note that this is only valid on Linux. On UNIX-based systems, network interfaces are usually identified using names like "eth0", "eth1", and so on. On Windows, these names are more complicated, for example, "\Device\NPF_{00B756E0-518A-4144 ... }.

Filter:
The Packet Sniffer can be configured to only intercept certain types of packets. For example, it can ignore all UDP packets, only intercept packets destined for port 80 on the network interface, ignore packets from a certain IP address, listen for all packets on the network, and so on.

The Packet Sniffer uses the libpcap library filter language to achieve this. This language has a complicated but powerful syntax that allows you to filter what packets are intercepted and what packets are ignored. As a general rule, the syntax consists of one or more expressions combined with conjunctions, such as "and", "or", and "not". The following table lists a few examples of common filters and explains what they filter:

Filter Expression What does it filter?
port 80 Capture only traffic for the HTTP Port (i.e. 80).
host 192.168.0.1 Capture traffic to and from IP address 192.168.0.1.
tcp Capture only TCP traffic.
host 192.168.0.1 and port 80 Capture traffic to and from port 80 on IP address 192.168.0.1.
tcp portrange 8080-8090 Capture all TCP traffic destined for ports from 8080 through to 8090.
tcp port 8080 and not src host 192.168.0.1 Capture all TCP traffic destined for port 8080 but not from IP address 192.168.0.1.

The default filter of "tcp" simply captures all TCP packets arriving on the network interface. For more information on how to configure filter expressions like these, please refer to the man pages of tcpdump man page, which can be found here.

Promiscuous Mode:
When listening in "promiscuous mode", the Packet Sniffer will capture all packets on the same Ethernet network, regardless of whether or not the packets are addressed to the network interface that the Sniffer is monitoring.