Mirrored port traffic not showing up on bridged network inside virtualbox guest running security onion 2.3 #10730
-
I have security onion installed on a virtualbox guest (version 2.3 security onion ISO Centos). Virtualbox is installed on a macbook pro running MacOS Monterey 12.6.7. I have a switch port configured to mirror another port. My macbookpro has a wifi interface for management and a usb gigabit ethernet interface for sniffing. Using the wireshark that is installed on my macbook I can see all of the tcp traffic so I know the mirrored port is working. However, when using tcpdump on the bridged interface used for sniffing traffic on the guest security onion VM I can only see some broadcast traffic and nothing else. I have tried configuring the 2nd sniffing interface with host-only mode as well but I don't see any traffic with that. I have promiscuous mode enabled. Do you have any suggestions for me to try? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 9 replies
-
I am assuming you have the Security Onion VM setup as a standalone node? What is the virtualization software you're using? You may need to set the any virtual switch between the host and vm to vlan 4095 https://docs.securityonion.net/en/2.3/vmware.html?highlight=vlan#esxi |
Beta Was this translation helpful? Give feedback.
I understand the bridged interfaces you've setup I was wondering if you could try "bypassing" the host. You mentioned the sniffing interface was a usb ethernet adapter. You should be able to tell virtual box to connect that usb device directly to the VM. That way your host machine will no longer see the device. It will be directly attached to the virtual machine. When you do that a new interface will appear on your SO vm that you will need to add to the bond0 interface with
so-monitor-add <interface_name>