UDP Packet Forwarding

UDP Packet Forwarding

If your company has a couple of SIEMS or maybe more than one NetFlow collector, you could probably benefit from a UDP Packet Forwarding system. Here’s the reason: many syslog and flow exporting devices can only export to one or two devices but, when you have hundreds of exporters that need to be updated to send to a second device, it can be a tedious error prone process even with automated scripts. Not to mention, some hardware can only send syslogs or flows to one location.

A UDP packet forward appliance sits in front of a SIEM or the legacy flow collector. In some cases, it assumes the IP address of the SIEM or flow collector and the SIEM is given a new IP address. When the appliance acting as the UDP forwarder receives the syslog and flow packets it will forward them on by modifying the destination IP address but, leaving the source IP address unchanged. This means the SIEM and legacy flow collector believe they are receiving the UDP packets directly from the source. A UDP forwarder can also multiply the UDP datagrams and forward a single UDP stream to multiple destinations as explained in the video below.


 

UDP forwarding appliance provides several benefits when it is placed locally to the SIEM and flow collection systems.

  • Reduces the amount of traffic on the network, especially over the WAN
  • Reduces the load on routers and switches as they only have to send UDP messages to one location
  • Lessens the configuration work load when hundreds or thousands of routers suddenly need to send NetFlow, sFlow, IPFIX or syslogs to a different IP address
  • Eases the burden trying to reconfigure hardware from different vendors and helps reduce the likelihood of mistakes
  • Provides management station redundancy by sending logs to multiple destinations simultaneously
  • Allows both network and security administrators to receive the same log messages while maintaining separate systems.

There are several solutions on the market that act as a UDP director for forwarding UDP packets.

However, the best commercial solutions provide the following additional features:

  • Detect when the destination hosts are offline and stop forwarding traffic
  • Maintain counters that allow admins to identify top UDP datagram producers
  • Allow the configuration of policies that will except UDP from entire subnets and send them to the correct destinations
  • Provide fault tolerance and redundancy in case of a failure

If you need to duplicate udp datagrams try the flow replicator. It is ideal for UDP Packet Forwarding.

David Delcourt

Husband, retired, volunteer, dog lover and tinkerer

6y

This is a great read, thanks for posting Mike!

Like
Reply

To view or add a comment, sign in

More articles by Michael Patterson

  • SD-WAN Short Comings Are Significant

    SD-WAN Short Comings Are Significant

    We are starting to see SDWAN deployments within our customer base. As pointed out in our list of vendors supporting…

  • SD-WAN Short Comings Are Significant

    SD-WAN Short Comings Are Significant

    We are starting to see SDWAN deployments within our customer base. As pointed out in our list of vendors supporting…

  • Correlating NetFlow with RADIUS Usernames

    Correlating NetFlow with RADIUS Usernames

    Correlating NetFlow with RADIUS Usernames to improve context security awareness is something we have done for several…

    1 Comment
  • The Danger of Google’s Massive Harvesting

    The Danger of Google’s Massive Harvesting

    It’s pretty safe to say that most users are well aware that companies like Google, Facebook, LinkedIn and hundreds of…

    2 Comments
  • What Makes a Great NetFlow Analyzer?

    What Makes a Great NetFlow Analyzer?

    Looking for a best of breed IPFIX / NetFlow Analyzer? Hopefully I can help you with your next investment toward deeper…

  • Finding Blind Spots with Network Traffic Analytics

    Finding Blind Spots with Network Traffic Analytics

    More than ever before, the applications installed on our hand held and laptop devices are sending data off to the…

  • User Authentication Monitoring

    User Authentication Monitoring

    Despite continued improvements in malware prevention, the success rate of infections still out paces the industries…

  • What is Network Traffic Analytics

    What is Network Traffic Analytics

    Traffic Analytics as it applies to the network and security is meant to help IT professionals who need to forensically…

  • AWS Log Reporting and Performance Optimization

    AWS Log Reporting and Performance Optimization

    As I travel onsite to visit customers, I’m consistently seeing first-hand the shrinking of their on premise data…

    2 Comments
  • Threat Investigations Suffer from Lack of Context

    Threat Investigations Suffer from Lack of Context

    Pretty much all companies fall victim to cybercrime eventually. Whether it is directly or indirectly, the cost varies…

Insights from the community

Others also viewed

Explore topics