{"id":14076,"date":"2017-09-14T14:16:33","date_gmt":"2017-09-14T14:16:33","guid":{"rendered":"https:\/\/www.firewallhardware.it\/ntopng-monitoraggio-passivo-e-attivo-del-traffico-di-rete\/"},"modified":"2019-11-11T11:39:17","modified_gmt":"2019-11-11T11:39:17","slug":"ntopng-passive-and-active-monitoring-of-network-traffic","status":"publish","type":"post","link":"https:\/\/blog.miniserver.it\/en\/firewall\/ntopng-passive-and-active-monitoring-of-network-traffic\/","title":{"rendered":"ntopng: passive and active monitoring of network traffic"},"content":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1517227445866{margin-top: 30px !important;}&#8221;]<strong>Introduction<\/strong><br \/>\nThe Internet runs faster and faster, the dangers in the digital world have increased and it<br \/>\nbecomes more and more complicated to explore the web.<br \/>\nOnce upon a time, when there was only Web 1.0 and the &#8220;good old&#8221; HTML, the biggest risk we ran was to find ourselves faced with a simple browser error. Who of us has never come across a &#8220;404 not found?&#8221;.<br \/>\nNow that, with Web 2.0, we interact and modify the contents of the pages directly online, we are exposed to daily threats that are undermined and hide behind simple actions such as clicking on a link.<br \/>\nMany have proposed and continue to propose solutions that we can use to protect ourselves and defend ourselves against cyber-attacks. In this article we will see ntopng, one of the best known solutions especially in the open source world.<\/p>\n<p><strong>Presentation<\/strong><br \/>\nNtopng was born as a traffic analysis tool and over time it has &#8220;evolved&#8221; to become an application filter. The project&#8217;s author is Prof. Luca Deri, &#8220;Research Scientist and Network Manager&#8221; at the Department of Computer Science of the University of Pisa.<\/p>\n<p>Visiting the web page of Luca, <a href=\"http:\/\/luca.ntop.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/luca.ntop.org\/<\/a>, we can find all his publications made over the years, get an idea about the scope of his scientific research and understand a little &#8216;what the spirit with which he created ntopng.<\/p>\n<p>In this regard it is a must to quote one of his sentences: &#8220;<em>The Internet today represents me free radio represented in the 70s. I think, do, create. Herein you can find all of the years that is my humble and tiny contribution to computer science (r) evolution.<\/em>&#8220;<\/p>\n<p><strong>What is NtopNG<\/strong><br \/>\nntopng is a traffic analysis networking tool that offers unprecedented visibility on packets traveling on the network.<br \/>\nOne of the most interesting features of the latest version of ntopng is undoubtedly that of application filter, thanks to which we can control more than 250 applications including Facebook, Youtube, WhatsApp, Skype and Tor, blocking or limiting the bandwidth of requests client and preventing, in fact, their uncontrolled use. Now let&#8217;s look at some functions and discover their potential.<\/p>\n<p><strong>Overview of features<\/strong><br \/>\nntopng is released in three different versions: Community, Professional and Enterprise. The various features are shown in the following comparative table.JTVCYWRyb3RhdGUlMjBiYW5uZXIlM0QlMjIzJTIyJTVE<strong>Introduction<\/strong><br \/>\nThe Internet runs faster and faster, the dangers in the digital world have increased and it<br \/>\nbecomes more and more complicated to explore the web.<br \/>\nOnce upon a time, when there was only Web 1.0 and the &#8220;good old&#8221; HTML, the biggest risk we ran was to find ourselves faced with a simple browser error. Who of us has never come across a &#8220;404 not found?&#8221;.<br \/>\nNow that, with Web 2.0, we interact and modify the contents of the pages directly online, we are exposed to daily threats that are undermined and hide behind simple actions such as clicking on a link.<br \/>\nMany have proposed and continue to propose solutions that we can use to protect ourselves and defend ourselves against cyber-attacks. In this article we will see ntopng, one of the best known solutions especially in the open source world.<\/p>\n<p><strong>Presentation<\/strong><br \/>\nNtopng was born as a traffic analysis tool and over time it has &#8220;evolved&#8221; to become an application filter. The project&#8217;s author is Prof. Luca Deri, &#8220;Research Scientist and Network Manager&#8221; at the Department of Computer Science of the University of Pisa.<\/p>\n<p>Visiting the web page of Luca, <a href=\"http:\/\/luca.ntop.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/luca.ntop.org\/<\/a>, we can find all his publications made over the years, get an idea about the scope of his scientific research and understand a little &#8216;what the spirit with which he created ntopng.<\/p>\n<p>In this regard it is a must to quote one of his sentences: &#8220;<em>The Internet today represents me free radio represented in the 70s. I think, do, create. Herein you can find all of the years that is my humble and tiny contribution to computer science (r) evolution.<\/em>&#8220;<\/p>\n<p><strong>What is NtopNG<\/strong><br \/>\nntopng is a traffic analysis networking tool that offers unprecedented visibility on packets traveling on the network.<br \/>\nOne of the most interesting features of the latest version of ntopng is undoubtedly that of application filter, thanks to which we can control more than 250 applications including Facebook, Youtube, WhatsApp, Skype and Tor, blocking or limiting the bandwidth of requests client and preventing, in fact, their uncontrolled use. Now let&#8217;s look at some functions and discover their potential.<\/p>\n<p><strong>Overview of features<\/strong><br \/>\nntopng is released in three different versions: Community, Professional and Enterprise. The various features are shown in the following comparative table.Generation of alarms based on time\/traffic thresholds or suspicious behavior such as visiting a malicious site<\/p>\n<table class=\"matrix\">\n<tbody>\n<tr>\n<th style=\"text-align: left;\"><strong>Feature<\/strong><\/th>\n<th style=\"text-align: center;\"><strong>Community<\/strong><\/th>\n<th style=\"text-align: center;\"><strong>Professional<\/strong><\/th>\n<th style=\"text-align: center;\"><strong>Enterprise<\/strong><\/th>\n<\/tr>\n<tr>\n<td>Monitoring of active flows and hosts of the network \u2020<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Identification of application protocols (Facebook, Youtube, BitTorrent, etc) in traffic<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Recording and display of the use of application protocols for each host over time<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Grouping of hosts for VLAN, Operating System, Country, and Autonomous Systems<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Geographical map of network communications made by each host<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Identification of the top talker hosts (senders and receivers) with resolution per minute<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>View the most requested HTTP sites from each host<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Export of communications on MySQL and ElasticSearch<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Generation of alarms based on time \/ traffic thresholds or suspicious behavior such as visiting a malicious site<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Alarms and warnings such as Slack messages<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Display of traffic for each VLAN<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Data collecting from nProbe to process the remote interfaces monitored by nProbe and flow export devices (eg routers and switches) as if they were local<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Displaying data collected by nProbe<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Grouping hosts into logical sets of IP and MAC addresses known as hosts pools \u2020\u2020<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Real-time view of the top talkers and application protocols and comparison with daily activities<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Browsing the registered MySQL data to identify the cause of network problems<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Generation of graphical reports with the top hosts, application protocols, countries, networks and autonomous systems in configurable time periods<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Traffic history based on profiles created using BPF (Berkeley Packet Filter) syntax \u2021<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Limiting\/blocking host traffic with custom policies for each protocol *<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Integration with LDAP authentication servers<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Query SNMP devices for data such as port status, traffic and MAC address information<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Integration with Nagios *<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>MySQL insertions to get writes to the fastest 5x database<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Data aggregation in MySQL for faster historical explorations<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Generate traffic and total activity reports for any host, network or interface<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Detection of attackers and victims through real-time alerts<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Exploration and filtering of alarms<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Viewing and storing traffic by SNMP port<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Viewing and storing NetFlow\/sFlow device data<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Captive Portal for Internet browsing *<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>Daily traffic quotas that are applied to clients *<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td><em>Parental control<\/em> with the DNS integration of SafeSearch *<\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #ff0000;\"><strong>\u2717<\/strong><\/span><\/td>\n<td style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>\u2713<\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>*<\/strong> Feature not available with Windows<br \/>\n\u2020 The <em>Enterprise<\/em> version allows simultaneous monitoring of up to 128 different network interfaces. <em>Professional<\/em> and <em>Community<\/em> versions allow monitoring of up to 32 different interfaces.<br \/>\n\u2020\u2020 The Enterprise version allows simultaneous monitoring of up to 128 different host pools. <em>Professional<\/em> and <em>Community<\/em> versions allow simultaneous monitoring of up to 3 different host pools.<br \/>\n\u2021 The Enterprise version allows simultaneous monitoring of up to 128 different traffic profiles. The <em>Professional<\/em> version allows the creation of 16 traffic profiles.<\/p>\n<p><strong>Supported platforms**<\/strong><\/p>\n<ul>\n<li>Unix (including Linux, * BSD, and MacOSX)<\/li>\n<li>Windows x64 (including the latest Windows 10)<\/li>\n<li>ARM<\/li>\n<\/ul>\n<p><strong>Web GUI<\/strong><\/p>\n<ul>\n<li>Available via HTML5-ready\/li web browser<\/li>\n<li>SSL \/ HTTPS support<\/li>\n<\/ul>\n<p><strong>Requirements<\/strong><\/p>\n<ul>\n<li>Memory usage Depends on the ntop configuration, the number of hosts, and the number of active TCP sessions. Generally it varies from a few MB (small LAN) to 100 MB for a WAN.<\/li>\n<li>Use of CPUD depends on the ntop configuration and traffic conditions. On a modern PC and on a large LAN, it is less than 10% of the total CPU load.<\/li>\n<\/ul>\n<p><strong>Protocols<\/strong><\/p>\n<ul>\n<li>Ethernet<\/li>\n<li>IPv4\/IPv6<\/li>\n<li>TCP\/UDP\/ICMP<\/li>\n<li>GRE<\/li>\n<li>DHCP\/BOOTP\/NetBIOS\/DNS\u2026<\/li>\n<li>250+ applications with Layer-7 protocol supported with nDPI<\/li>\n<li>\u2026many others.<\/li>\n<\/ul>\n<p><strong>Extensibility<\/strong><\/p>\n<ul>\n<li>Compatibility with scripts in LUA<\/li>\n<li>Web interface extensions without having to change the Ntopng C ++ engine.<\/li>\n<\/ul>\n<p><strong>Additional features<\/strong><\/p>\n<ul>\n<li>sFlow, NetFlow (including v5 and v9) and IPFIX supported via nProbe (collection from multiple nProbes is supported).<\/li>\n<li>Statistic for: Internet Domain, AS (Autonomous Systems), VLAN (Virtual LAN).<\/li>\n<li>Decoding protocol for all application protocols supported by nDPI.<\/li>\n<\/ul>\n<p><strong>**<\/strong>NtopNg is also available for Ubiquiti EdgeRouter (Lite or X).<\/p>\n<p><strong>Installation<\/strong><br \/>\nInstallation is very simple. After installing your preferred operating system, simply download the packages and install them following the instructions on <a href=\"http:\/\/packages.ntop.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/packages.ntop.org<\/a>.<\/p>\n<p><strong>LAB<\/strong><br \/>\nWe have done two laboratories, one of only monitoring and the other with filtering (you need a license &#8211; see table of characteristics). The latter also includes the first one, so if you have already purchased a license, you can skip reading the monitoring lab.<\/p>\n<p><strong>Monitoring Lab<\/strong><br \/>\nIn this lab we used the <a href=\"https:\/\/www.miniserver.it\/compact-small-utm-3-gsm\" target=\"_blank\" rel=\"noopener noreferrer\">Compact Small UTM<\/a> appliance as a tool to analyze our network traffic.<\/p>\n<p>To make it possible to have a copy of the traffic to be analyzed, we put the affected interface of our firewall <a href=\"https:\/\/www.miniserver.it\/firewall\/appliance-a1-server-aluminum\" target=\"_blank\" rel=\"noopener noreferrer\">A1 Server Alluminium<\/a> in SPAN: for us it was the LAN interface. The same thing can also be done on a switch that supports the configuration of the SPAN.<\/p>\n<p>Once entered in ntopng, in the navigation menu we find, at the top, the voice Interface. By clicking on it, we can see which is the NIC that is physically connected to the firewall.[vc_single_image image=&#8221;13677&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1521559475830{margin-top: -20px !important;padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;background-color: #f4f4f2 !important;}&#8221;]Below is the network scheme that best represents what is written:[vc_single_image image=&#8221;13680&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1521559783048{margin-top: -20px !important;padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;background-color: #f4f4f2 !important;}&#8221;]As shown in the diagram, ntopng is connected &#8220;in parallel&#8221; to the firewall and is therefore &#8220;invisible&#8221;.<\/p>\n<p>LAN interface traffic is duplicated on the new SPAN interface. The latter is the INPUT interface of ntopng.<\/p>\n<p>In this first configuration mode, we analyzed traffic for about two days to better understand the type of traffic on the network. This modality, however, has the sole purpose of analysis and is therefore &#8220;passive&#8221;. From here, we can not limit or block anything. Given the potential of the instrument, we chose almost immediately to reconfigure it with a bridge.<\/p>\n<p><strong>Application Filtering Lab<\/strong><br \/>\nAlso in this lab we used the <a href=\"https:\/\/www.miniserver.it\/compact-small-utm-3-gsm\" target=\"_blank\" rel=\"noopener\">Compact Small UTM<\/a> UTM appliance with ntopng as a tool for analyzing our network traffic and for filtering.<\/p>\n<p>To make sure that it could be in line with our <a href=\"https:\/\/www.miniserver.it\/firewall\/appliance-a1-server-aluminum\" target=\"_blank\" rel=\"noopener noreferrer\">A1 Server Alluminium<\/a> we have created a bridge between two ntopng NICs.<\/p>\n<p>So in this second lab we wanted to test the filtering. This function, really useful, is certainly interesting for those who, like us, do not confine the problem of security in the dark corner of the company.<\/p>\n<p>Bridge: the traffic of our LAN, which goes to the uplink on the internet, instead of going to the firewall is then hijacked in ntopng. The latter has been configured with two NICs in <a href=\"https:\/\/it.wikipedia.org\/wiki\/Bridge_(informatica)\" target=\"_blank\" rel=\"noopener noreferrer\">bridge<\/a> [note: two NICs of ntopng must be used for each bridge] so it is able to analyze the traffic and &#8220;pass&#8221; only &#8220;legitimate&#8221; packets to the firewall. Once you have entered Ntopng, in the interface menu you will find the bridge you have created.[vc_single_image image=&#8221;13683&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1521560333376{margin-top: -20px !important;padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;background-color: #f4f4f2 !important;}&#8221;]Below is the network scheme that best represents what is written:[vc_single_image image=&#8221;13683&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1521560493758{margin-top: -20px !important;padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;background-color: #f4f4f2 !important;}&#8221;]In our lab (see image below), we have made a very simple 2Mb\/s limiter (traffic shaper) and put it in some policies. In others, however, as for the family of social networks, we have chosen not to allow the transit of packages.[vc_single_image image=&#8221;13685&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1521560728136{margin-top: -20px !important;padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;background-color: #f4f4f2 !important;}&#8221;]All in a very intuitive, simple and fast.<br \/>\nBelow is an image showing how to create the bridge in the NtopNG configuration file:[vc_single_image image=&#8221;13687&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1521561139164{margin-top: -20px !important;padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;background-color: #f4f4f2 !important;}&#8221;]<strong>Conclusions<\/strong><br \/>\nPerhaps the description of the labs is not immediately evident, but application filtering obviously implies monitoring.<\/p>\n<p>This means that we can continue to monitor our network even if we configure the appliance in &#8220;active&#8221; mode as shown previously.<\/p>\n<p>ntopng is, therefore, indispensable for anyone who does not want to be a passive viewer of the traffic generated on his company network.<\/p>\n<p>It is also very useful for all those who, for enforcement, or for simple need &#8211; think for example to those who do not have sufficient connectivity to support the volume of data today &#8211; must have traffic control. Now you know how to do it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet runs faster and faster, the dangers in the digital world have increased and it becomes more and more complicated to explore the web.<\/p>\n","protected":false},"author":11,"featured_media":13690,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[123,143],"tags":[144],"class_list":["post-14076","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-firewall","category-ntopng","tag-ntopng-en"],"_links":{"self":[{"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/posts\/14076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/comments?post=14076"}],"version-history":[{"count":10,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/posts\/14076\/revisions"}],"predecessor-version":[{"id":19003,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/posts\/14076\/revisions\/19003"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/media\/13690"}],"wp:attachment":[{"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/media?parent=14076"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/categories?post=14076"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/tags?post=14076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}