Analysis of Packet filter operation on 2/10/05 by Marc Lacasse no suppression ~ 4 minutes of data click here for full data log # entries cum % total type 663 total in 4 minutes 349 349 52.6% 128.196.100.x to 128.196.100.255 86 435 65.6% 128.196.100.51.631 to all 83 518 78.1% 128.196.100.50.631 to all 37 555 83.7% 128.196.100.19.631 to all 69 624 94.1% 192.33.141.x to 192.33.14.255 23 647 97.6% 192.33.141.31.631 to all suppressing local net and port bootpc 10 hours click here for full data log ignore source={128.196.100.x, 192.33.141.x, 199.104.148.x}, port bootpc # entries cum. % of total type 746 total 283 283 37.9% 169.254.16.38.netbios-nsto 169.254.255.255 147 430 57.6% 169.254.4.112.netbios-dgmto 169.254.255.255 87 517 69.3% 169.254.40.111.netbios-dgmto 169.254.255.255 57 574 76.9% call 1816 seq 11xxx 52 626 83.9% 24.1 -> 25.9 > 199.104.149.x.1027 udp880 *** suspicious *** 40 666 89.3% icmp6: router solicitation 32 698 93.6%(DF) 13 711 95.3% 64.62.253.55.www 7 718 96.2% icmp6: neighbor sol:who has About 98 % of the traffic originates in the MMT net or the Ridge network. Some of it is broadcast to everyone (255.255.255.255) which seems odd. The internal MMT broadcasts ( to 128.196.100.255) constitute over half of the traffic arriving at IOTA. Of the non local traffic The 169.254 subnet is contributing almost 70% of the traffic filtered out. Why are these messages appearing on our network? [Note from Ted Groner - this network handles misconfigured DNS/DHCP servers. or from the web If your local IP address is returned as 169.254.y.z with a subnet mask of 255.255.0.0, the IP address was assigned by the Automatic Private IP Addressing (APIPA) feature of Windows XP Professional. This assignment means that TCP/IP is configured for automatic configuration, that no DHCP server was found, and that no alternative configuration is specified. ] The 54 entries from the 24.x.x.x and 25.x.x.x networks are suspicious. They appear in clusters with the source being changed and the target running through the computers at IOTA. Ted Groner suggested putting SNORT on the inside of the net to see if anything is coming though. I looked t information at the website on the program but I don't feel comfortable installing that myself. Angela's old computer Fringes could be used since is is not doing very much at present. data logs are in text with tab delimiters. I find it useful to read into a spreadsheet and then sort pieces of it by source, destination or type. Some of the text lines are rather long. Marc Lacasse 2/11/2005 Additional data taken on 2/17-19/05 packlog218a 2/16/05 2/18/05 3:41 PM 7:57 PM duration (hours) 52.275277778 # entries 1813 cum. % Number Type % items 1817 total Router traffic 20 358 icmp6: router solicitation 12 213 199.104.149.17.domain: 35 4 70 icmp6: neighbor sol: who has x Win traffic 9 162 win 16384 (DF) 6 113 win 64240 (DF) 6 111 win 65535 (DF) 2 43 win 64800 (DF) 2 39 win 5840 (DF) 29 4 66 other win XXXXX Suspicious traffic 14 255 24.20.x.x to 25.41.x.x > iota.x udp 880 Other traffic 6 100 >128.196.100.107.3068: 3 53 >206.197.219.142.x: ack 2 41 128.196.128.234>iota.15 udp port netbios-nS unreachable 2 40 > 224.0.0.x: igmp 2 36 170.224.33.x>iota.9 1 26 >192.33.141.10.38293: udp 16 1 25 >199.104.149.17.32805: udp204 (DF) 1 25 >199.104.149.9.x: udp 4 1 13 >206.197.219.x.x: 1 24 leftover