3) Confirm that the traffic generated on the secured target is gets to the Database Firewall. For that we must peek
at the network interface that is being used by the enforcement point with one of the following methods:
a) Using tcpdump:
#tcpdump -i <eth0>|grep <ip_of_the_database> | grep <ip_of_the_client_connecting_to_the_database>
[root@dbfw0039f6904728 ~]# tcpdump -i eth0|grep "10.171.32.120"
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
09:10:27.316730 IP 10.171.32.120.32723 >
management_interface.oracle_database_firewall_internal.livelan: Flags [P.], seq
4271588316:4271588614, ack 3152656695, win 405, length 298
09:10:27.316780 IP management_interface.oracle_database_firewall_internal.livelan >
10.171.32.120.32723: Flags [.], ack 298, win 141, length 0
09:10:27.318423 IP management_interface.oracle_database_firewall_internal.33204 >
10.171.32.120.cichild-lm: Flags [P.], seq 507493789:507494087, ack 4174470361, win 165, length 298
09:10:27.531230 IP 10.171.32.120.cichild-lm >
management_interface.oracle_database_firewall_internal.33204: Flags [P.], seq 1:458, ack 298, win
282, length 457
09:10:27.531293 IP management_interface.oracle_database_firewall_internal.33204 >
10.171.32.120.cichild-lm: Flags [.], ack 458, win 164, length 0
09:10:27.531427 IP management_interface.oracle_database_firewall_internal.livelan >
10.171.32.120.32723: Flags [P.], seq 1:458, ack 298, win 141, length 457
09:10:27.719307 IP 10.171.32.120.32723 >
management_interface.oracle_database_firewall_internal.livelan: Flags [.], ack 458, win 428, length
0
09:10:27.719882 IP 10.171.32.120.32723 >
management_interface.oracle_database_firewall_internal.livelan: Flags [P.], seq 298:319, ack 458,
win 428, length 21
09:10:27.719922 IP management_interface.oracle_database_firewall_internal.livelan >
10.171.32.120.32723: Flags [.], ack 319, win 141, length 0
If the Database Firewall is configured in-line one has to check that bridge interface is up and running:
#ifconfig
#brctl show br<n>
If the Database Firewall is configured in DAM mode one has to run the tcpdump against the Database Firewall
network interface where the cable from the spanning port (mirror port) is plugged:
评论