Dynamic monitoring of network traffic

ABSTRACT

A device, connected to a monitoring appliance, may include a traffic analyzer to receive a data unit and identify a traffic flow associated with the data unit. The device may also include a traffic processor to receive the data unit and information regarding the identified traffic flow from the traffic analyzer, determine that the identified traffic flow is to be monitored by the monitoring appliance, change a port number, associated with the data unit, to a particular port number to create a modified data unit when the identified traffic flow is to be monitored by the monitoring appliance, and send the modified data unit to the monitoring appliance.

BACKGROUND

Many companies have invested in a variety of monitoring equipment to gain visibility into network and/or application usage, and to adhere to government stipulated compliance requirements. This monitoring equipment is generally passive and monitors traffic received on a particular port. This approach to monitoring does not work well in today's environment. One reason for this is that applications, which in the past typically limited their traffic to a particular port, no longer do so and, instead, use various ports. Another reason for this is that particular ports, which in the past typically were dedicated to traffic of particular applications, now receive traffic of various applications.

SUMMARY

According to one implementation, a device, connected to a monitoring appliance, may include a traffic analyzer to receive a data unit and identify a traffic flow associated with the data unit. The device may also include a traffic processor to receive the data unit and information regarding the identified traffic flow from the traffic analyzer, determine that the identified traffic flow is to be monitored by the monitoring appliance, change a port number, associated with the data unit, to a particular port number to create a modified data unit when the identified traffic flow is to be monitored by the monitoring appliance, and send the modified data unit to the monitoring appliance.

According to another implementation, a method, performed by a device that is connected to a monitoring appliance, may include storing, as entries in a table, information identifying a number of traffic flows and a corresponding number of port numbers, where one of the entries stores information identifying one of the traffic flows and a corresponding one of the port numbers; receiving a data unit; identifying a traffic flow associated with the data unit; determining that information associated with the identified traffic flow matches the one of the traffic flows in the table; replacing a port number, associated with the data unit, with the corresponding one of the port numbers from the table to create a modified data unit when the information associated with the identified traffic flow matches the one of the traffic flows in the table; and sending the modified data unit to the monitoring appliance.

According to yet another implementation, a device, connected to a monitoring appliance, may include means for receiving network traffic associated with communication between a client and a server, where the network traffic includes a number of different traffic flows tunneled via a common transport protocol; means for separating the different traffic flows from the network traffic to create a number of separate traffic flows; means for identifying each of the separate traffic flows; means for determining that the monitoring appliance is configured to monitor one of the separate traffic flows; means for replacing a port number, associated with the one of the separate traffic flows, with a particular port number to create a modified traffic flow when the monitoring appliance is configured to monitor the one of the separate traffic flows; and means for sending the modified traffic flow to the monitoring appliance.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate one or more embodiments described herein and, together with the description, explain these embodiments. In the drawings:

FIG. 1 is a diagram of an exemplary environment in which systems and methods described herein may be implemented;

FIG. 2 is a diagram illustrating exemplary components of the network device of FIG. 1;

FIG. 3 is a diagram of exemplary functional components of the network device of FIG. 1;

FIG. 4 is a diagram of an exemplary implementation of the table of FIG. 3;

FIG. 5 is a diagram of exemplary functional components of the traffic analyzer of FIG. 3;

FIG. 6 is a diagram of exemplary functional components of the traffic flow identifier of FIG. 5;

FIG. 7 is a diagram of an exemplary implementation of the traffic flow database of FIG. 6;

FIG. 8 is a flowchart illustrating an exemplary process for providing network traffic to a monitoring appliance; and

FIG. 9 is a diagram illustrating an example of a concept described herein.

DETAILED DESCRIPTION

The following detailed description refers to the accompanying drawings. The same reference numbers in different drawings may identify the same or similar elements. Also, the following detailed description does not limit the invention. Instead, the scope of the invention is defined by the appended claims and equivalents.

Exemplary Environment

FIG. 1 is a diagram of an exemplary environment 100 in which systems and methods described herein may be implemented. Environment 100 may include a client 110 connected to a set of servers 120-1, 120-2, and 120-3 (collectively referred to as “servers 120,” and individually as “server 120”) via a network device 130, and a network 140. Environment 100 may also include a switch 150 connected to network device 130 and to a set of monitoring appliances (MAs) 160-1, 160-2, and 160-3 (collectively referred to as “monitoring appliances 160,” and individually as “monitoring appliance 160”). The exemplary number and configuration of components illustrated in FIG. 1 is provided for simplicity. In practice, environment 100 may include more, fewer, different, and/or differently-arranged components than illustrated in FIG. 1. For example, each of monitoring appliances 160 may connect directly to an interface of network device 130, rather than connecting to network device 130 via switch 150. Also, some functions described as being performed by one component may be performed by a different component or a combination of components.

Client 110 may include a device, such as a personal computer, a laptop computer, a personal digital assistant (PDA), a wireless telephone, or another type of computation or communication device. Client 110 may communicate with server 120 over network 140 via wired and/or wireless connections.

Servers 120 may each include a server device, such as a computer device, that may provide client 110 with access to various resources in environment 100. In one implementation, the network resources reside on servers 120. In another implementation, the network resources may be located externally with respect to servers 120.

Network device 130 may include a firewall device, an intrusion detection system, a router, a switch, another type of device that may process and/or forward network traffic, or a combination of one or more of these devices. In an exemplary implementation, network device 130 may identify a traffic flow associated with network traffic to and/or from servers 120 and determine whether, based on the traffic flow, to forward the network traffic to one or more of monitoring appliances 160. The term “traffic flow,” as used herein, may refer to an application or protocol with which network traffic is associated. For example, network traffic may be associated with a HyperText Transfer Protocol (HTTP) traffic flow, a session initiation protocol (SIP) traffic flow, a structured query language (SQL) traffic flow, a voice over Internet protocol (VoIP) traffic flow, or some other form of application or protocol.

Network 140 may include one or more networks, such as a wide area network (WAN) (e.g., the Internet), a local area network (LAN), a metropolitan area network (MAN), a telephone network (e.g., the Public Switched Telephone Network (PSTN) or a cellular network), a satellite network, or a combination of networks.

Switch 150 may include a switching device that may receive data from network device 130 and provide the data to an appropriate one or more of monitoring appliances 160. Monitoring appliances 160 may each include a computer device that may monitor network traffic. Different monitoring appliances 160 may monitor different types of network traffic for different purposes. For example, a monitoring appliance 160 may monitor web activity regarding a particular web site. Another monitoring appliance 160 may act as a net recorder that records traffic and analyzes the traffic for some kind of event or data. Yet another monitoring appliance 160 may track client interaction with a server (or a set of servers) to track client selections, system response times, etc. Other monitoring appliances 160 may monitor other types of network traffic.

Exemplary Network Device Architecture

FIG. 2 is a diagram illustrating exemplary components of network device 130. As shown in FIG. 2, network device 130 may include a bus 210, a processor 220, a memory 230, a storage device 240, an input/output device 250, and a communication interface 260. In other implementations, network device 130 may include additional, fewer, different, or differently-arranged components.

Bus 210 may include a path that permits communication among the components of network device 130. Processor 220 may include a processor, a microprocessor, an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), or another type of processing logic that may interpret and execute instructions. Memory 230 may include a random access memory (RAM) or another type of dynamic storage device that may store information and/or instructions for execution by processor 220; a read only memory (ROM) or another type of static storage device that may store static information and/or instructions for use by processor 220; and/or another type of memory, such as cache or flash memory. Storage device 240 may include a recording medium to store data that may be used by processor 220.

Input/output device 250 may include a mechanism that permits an operator to input information to network device 130, such as a button, a keyboard, a keypad, or the like; and/or a mechanism that outputs information to the operator, such as a light emitting diode (LED), a display, or the like.

Communication interface 260 may include any transceiver-like mechanism(s) that enables network device 130 to communicate with other devices and/or systems. For example, communication interface(s) 260 may include one or more interfaces to a local network (e.g., a LAN) and/or one or more interfaces to a wide area network (e.g., the Internet). In one implementation, communication interface(s) 260 may include an Ethernet interface.

Network device 130 may perform processes associated with identifying traffic for transmission to monitoring appliances, as described in detail below. According to an exemplary implementation, network device 130 may perform these operations in response to processor 220 executing sequences of instructions contained in a computer-readable medium, such as memory 230. A computer-readable medium may be defined as a physical or logical memory device. A logical memory device may refer to memory space within a single, physical memory device or spread across multiple, physical memory devices.

The software instructions may be read into memory 230 from another computer-readable medium, such as storage device 240, or from another device via communication interface(s) 260. The software instructions contained in memory 230 may cause processor 220 to perform processes that will be described later. Alternatively, hardwired circuitry may be used in place of, or in combination with, software instructions to implement processes described herein. Thus, implementations described herein are not limited to any specific combination of hardware circuitry and software.

FIG. 3 is a diagram of exemplary functional components of network device 130. As shown in FIG. 3, network device 130 may include a traffic analyzer 310, a traffic processor 320, and a table 330. The functional components shown in FIG. 3 may be implemented by hardware (e.g., processor 220) or a combination of hardware and software. While a particular number and arrangement of components are shown in FIG. 3, in other implementations, network device 130 may include fewer, additional, different, or differently-arranged components.

Traffic analyzer 310 may receive network traffic in the form of packets. While packets will be used in the description below, implementations described herein may apply to any form of data unit either in the form of packets or non-packets. Generally, traffic analyzer 310 may inspect each received packet and identify the traffic flow with which the received packet is associated. In some situations, multiple traffic flows can be tunneled (layered) via a common transport protocol, such as HTTP (e.g., SQL over HTTP). In these situations, traffic analyzer 310 may separate, or demultiplex, the different traffic flows for further processing, as will be described below. Traffic analyzer 310 may provide the packet and information regarding the identified traffic flow to traffic processor 320.

Traffic processor 320 may operate upon the traffic flows identified by traffic analyzer 310 to determine whether these are traffic flows that are to be monitored by monitoring appliances 160. Traffic processor 320 may make its determination using, for example, the information in table 330. In some situations, traffic processor 320 may perform port translation. Port translation may refer to the act of changing port number information in a received packet (e.g., in a header of the received packet).

In the situation where multiple traffic flows are tunneled (layered) via a common transport protocol, such as HTTP (e.g., SQL over HTTP), the format of the data in these traffic flows may differ from a native format of these traffic flows. Generally, monitoring appliances 160 are configured to listen for and process traffic flows in their native formats. Traffic processor 320 may convert (e.g., transcode) the format of a traffic flow, to be monitored, to the native format of the traffic flow. Thus, when traffic processor 320 provides the traffic flow to a monitoring appliance 160, traffic processor 320 may send packets of the traffic flow to monitoring appliance 160 in the format in which monitoring appliance 160 expects to receive the packets.

Table 330 may include information on the traffic flows that require monitoring by monitoring appliances 160. Table 330 may also include information that indicates whether port translation is required for a particular monitored traffic flow. In some situations, a monitoring appliance 160 may be configured to monitor a particular type of traffic flow (e.g., a HTTP traffic flow) sent to a particular port (e.g., port 80). This type of traffic flow (e.g., HTTP traffic flow) may not necessarily be sent only to that particular port. The traffic flow (e.g., HTTP traffic flow) that was sent to another port may be ignored by monitoring appliance 160. Table 330 may require port translation in these situations so that all traffic flow of this type (e.g., HTTP traffic flow) provided to monitoring appliance 160 indicates the particular port expected by monitoring appliance 160 (e.g., port 80).

FIG. 4 is a diagram of an exemplary implementation of table 330. As shown in FIG. 4, table 330 may include a traffic flow field 410, a mirror field 420, and a port translation field 430. In other implementations, table 330 may include fewer, additional, or different fields. The fields of table 330 may be user-configurable.

Traffic flow field 410 may include information regarding different types of traffic flows that monitoring appliances 160 are configured to monitor. As shown in FIG. 4, an exemplary traffic flow field 410 may identify SIP as a traffic flow that a monitoring appliance 160 is configured to monitor. Mirror field 420 may indicate whether a traffic flow is to be mirrored (e.g., copied and sent) to a monitoring appliance 160 and may identify an interface port (on network device 130) to which to transmit the traffic flow. As shown in FIG. 4, an exemplary mirror field 420 may indicate YES (indicating that the traffic flow is to be mirrored to a monitoring appliance 160) and I/F 6 (indicating that the traffic flow is to be transmitted to interface port 6 of network device 130). Port translation field 430 may include information regarding a port number. Mirrored packets, associated with the traffic flow, may be modified to replace the port number, included in the header of the packets, with the port number in port translation field 430. If the port numbers are the same, then this may indicate that no port translation is necessary. As shown in FIG. 4, an exemplary port translation field 430 may identify port 5060 (indicating that port translation is to be performed to port 5060).

Exemplary Traffic Analyzer

FIG. 5 is a diagram of exemplary functional components of traffic analyzer 310. As shown in FIG. 5, traffic analyzer 310 may include a traffic flow demultiplexer 510 and a traffic flow identifier 520. In other implementations, traffic analyzer 310 may include fewer, additional, different, or differently-arranged components.

Traffic flow demultiplexer 510 may receive network traffic and provide information regarding a traffic flow to traffic flow identifier 520. If the network traffic includes multiple, different traffic flows (e.g., multiple traffic flows can be tunneled (layered) via a common transport protocol), traffic flow demultiplexer 510 may separate the different traffic flows. Traffic flow demultiplexer 510 may perform deep packet inspection to separate the traffic flows contained in the network traffic. For example, traffic flow demultiplexer 510 may examine packet headers and/or payloads to separate the different traffic flows. Traffic flow demultiplexer 510 may provide information regarding the different traffic flows to traffic flow identifier 520.

Traffic flow identifier 520 may identify the particular traffic flow(s) from traffic flow demultiplexer 510. FIG. 6 is a diagram of exemplary functional components of traffic flow identifier 520. As shown in FIG. 6, traffic flow identifier 520 may include signature database 610, traffic flow identification unit 620, and traffic flow database 630. In other implementations, traffic flow identifier 520 may include fewer, additional, different, or differently-arranged components.

Signature database 610 may store information associated with various traffic flows that may traverse network device 130. As described above, these traffic flows may be associated with different applications and/or protocols. In an exemplary implementation, signature database 610 may store signature information associated with various traffic flows, along with information identifying the particular traffic flow. The terms “signature information” and “signature,” as used herein, may refer to characteristic information identifying, for example, data patterns, strings, expressions, etc., that are associated with various data flows and that may be used to identify specific data flows. Alternatively, or additionally, the signature information may include statistical information, such as packet lengths, inter-packet arrival times, etc.

Traffic flow identification unit 620 may include logic that may receive network traffic transmitted in network 140, such as data transmitted from client 110 to server(s) 120, or vice versa, and identify a particular traffic flow associated with this data transmission. For example, traffic flow identification unit 620 may receive one or more packets from client 110, compare information in the packet(s) to information in signature database 610, and identify the traffic flow associated with the packet(s) by matching information in the packet(s) transmitted from client 110 to information in signature database 610.

In an exemplary implementation, traffic flow identification unit 620 may include deterministic finite automaton (DFA) logic and/or perl compatible regular expression (PCRE) logic that may search for a pattern and/or a regular expression (regex) in signature database 610 that matches a signature (e.g., a pattern, expression, string, etc.) in one or more client-to-server (CTS) packets sent from client 110. Traffic flow identification unit 620 may also examine one or more server-to-client (STC) packets sent from server 120 to client 110 to verify the traffic flow associated with the packets.

Traffic flow database 630 may store information identifying traffic flows that may be associated with received packets, along with other information associated with the particular traffic flows. The information in traffic flow database 630 may then be used by traffic flow identification unit 620 to quickly identify a particular traffic flow associated with received packets. In one implementation, traffic flow identification unit 620 may check information associated with the received packet(s) against information in traffic flow database 630 first to determine whether the traffic flow can be identified and, if the traffic flow cannot be identified from traffic flow database 630, traffic flow identification unit 620 may check information associated with the received packet(s) against information in signature database 610 to identify the traffic flow.

FIG. 7 is a diagram of an exemplary implementation of traffic flow database 630. As shown in FIG. 7, traffic flow database 630 may include port number field 710, protocol field 720, destination field 730, and traffic flow field 740. In other implementations, traffic flow database 630 may include fewer, additional, or different fields.

Port number field 710 may include information identifying a destination port number associated with packets in received network traffic. The destination port number may be included in the header of a received packet (e.g., a Transmission Control Protocol/Internet Protocol (TCP/IP) packet) and may identify a destination port on a destination device, such as a destination port on server 120. Protocol field 720 may include information regarding a protocol associated with the packets in received network traffic. The protocol information may also be included in the header of received packets. The protocol information may identify one of any number of protocols used in network communications, such as TCP or user datagram protocol (UDP).

Destination field 730 may include information regarding a destination associated with packets in received network traffic. For example, destination field 730 may identify a destination server, such as server 120. In this case, destination field 730 may include an IP address, such as an IP address associated with server 120 or IP addresses associated with a set of servers 120.

Traffic flow field 740 may identify the particular traffic flow associated with the port number, protocol information, and destination information stored in fields 710, 720, and 730. In an exemplary implementation, once a particular traffic flow, associated with received network traffic, has been identified by traffic flow identification unit 620 (using, for example, information in signature database 610), traffic flow identification unit 620 may store the port number, protocol information, and destination information associated with the network traffic in fields 710, 720, and 730, and may store information identifying the traffic flow in traffic flow field 740.

Exemplary Process

FIG. 8 is a flowchart illustrating an exemplary process for providing network traffic to a monitoring appliance. The process of FIG. 8 may be performed by one or more components of network device 130. In another implementation, the process of FIG. 8 may be performed by a device separate from or in conjunction with network device 130.

The process of FIG. 8 may begin with network traffic being received (block 810). For example, traffic analyzer 310 may receive a packet from a client, such as client 110, for transmission to a server, such as server 120. Assume that client 110 is requesting a resource from server 120 and sends one or more packets to server 120 that is/are received by traffic analyzer 310 of network device 130.

The traffic flows included in the received network traffic may be separated (block 820). In some situations, the network traffic may include data associated with multiple, different traffic flows. In these situations, as previously described, traffic analyzer 310 may perform deep packet inspection to identify the parts of the network traffic associated with these different traffic flows. For example, traffic analyzer 310 may analyze information in a packet header and/or payload to separate the different traffic flows. In other situations, the network traffic may include data associated with only a single traffic flow. In these situations, traffic analyzer 310 may not need to perform block 820.

The traffic flow included in the received network traffic may be identified (block 830). For example, traffic analyzer 310 may examine one or more packets from client 110 to identify the traffic flow associated with the packet(s). As described above, traffic flow identification unit 620 may receive one or more CTS packets from client 110 and compare information in the received CTS packet(s) to information in signature database 610 to attempt to identify the traffic flow associated with the packet(s). In an exemplary implementation, traffic flow identification unit 620 may identify the traffic flow by performing a pattern matching algorithm, such as a DFA algorithm, a PCRE algorithm, or another algorithm to identify patterns, expressions, strings, etc., used in the communication from client 110 that match or correspond to a signature stored in signature database 610. For example, traffic flow identification unit 620 may search signature database 610 using the initial CTS packet from client 110 for a pattern or regex that matches a pattern or expression included in the CTS communication.

In one alternative implementation, traffic flow identification unit 620 may examine one or more packets in the CTS communication to identify particular information associated with the communication. For example, traffic flow identification unit 620 may identify the destination port number, protocol, and/or destination device (e.g., destination IP address) associated with the communication from client 110. This information may be included in the header of the initial CTS packet from client 110.

Traffic flow identification unit 620 may then use the identified destination port number, protocol, and/or destination device to search traffic flow database 630 for an entry in which fields 710, 720, and 730 match the identified destination port number, protocol, and destination device, respectively. If a match is found, traffic flow identification unit 620 may identify the traffic flow stored in traffic flow field 740 for the matching entry. In the event that a match is not found, traffic flow identification unit 620 may identify the traffic flow using signature database 610.

In some situations, traffic analyzer 310 may be able to identify the traffic flow from information in a single packet. In other situations, traffic analyzer 310 may need information from multiple packets to be able to identify the traffic flow. For example, traffic analyzer 310 may process an initial packet, tentatively identify the packet as being associated with a particular traffic flow, store a copy of the packet, and transmit the packet towards its destination. When traffic analyzer 310 receives a response packet to the initial packet, as an initial STC packet, traffic analyzer 310 may confirm the tentative identification of the traffic flow.

It may be determined whether a monitoring appliance is configured to monitor this traffic flow (block 840). It may be determined that a monitoring appliance 160 is configured to monitor a traffic flow when there is an entry in table 330 corresponding to that traffic flow. If the traffic flow corresponds to a SQL traffic flow, for example, traffic processor 320 may determine whether table 330 includes an entry that identifies SQL in traffic flow field 410 (FIG. 4). If no monitoring appliance 160 is configured to monitor this traffic flow (block 840—NO), then the process may return to block 810 to process additional received network traffic.

If a monitoring appliance is configured to monitor this traffic flow (block 840—YES), then the port number for packets on this traffic flow may be translated (block 850). For example, traffic processor 320 may read information from port translation field 430 (FIG. 4) in the appropriate entry in table 330. Traffic processor 320 may replace the port number in packets, associated with this traffic flow, with the port number from port translation field 430. If these port numbers match, then traffic processor 320 need not actually perform the port number translation.

In the situation where multiple traffic flows are tunneled (layered) via a common transport protocol, the format of a traffic flow, to be monitored, may be converted to the native format of the traffic flow (block 860). For example, traffic processor 320 may use a known transcoding technique to convert the format of the traffic flow to the native format.

The packets, associated with this traffic flow, may be sent to the appropriate monitoring appliance (block 870). For example, traffic processor 320 may read information from mirror field 420 (FIG. 4) in the appropriate entry in table 330. From mirror field 420, traffic processor 320 may identify an interface port via which to send packets associated with this traffic flow. This interface port may correspond to an interface port of network device 130.

Example

FIG. 9 is a diagram illustrating an example of a concept described herein. As shown in FIG. 9, assume that a monitoring appliance is configured to monitor HTTP traffic that is sent to port 80. As a result, an entry may be stored in the table that identifies HTTP traffic in the traffic flow field, indicates that the HTTP packets are to be mirrored to interface port 5, and indicates that the port number in the HTTP packets is to be translated to port 80 (i.e., the port that the monitoring appliance expects).

Assume that the traffic analyzer receives an initial HTTP packet (e.g., a HTTP GET packet) from a client and that the packet includes a port number of 5000. The traffic analyzer may process the packet. Assume that, in this case, the traffic analyzer cannot positively identify the packet as a HTTP packet. As a result, the traffic analyzer may store a copy of the packet and transmit the packet towards its destination (i.e., towards the server).

The server may receive the packet and process the packet. If the server determines that the packet is a valid HTTP packet, the server may respond by transmitting a response HTTP packet (e.g., a HTTP 200 OK packet) to the client. The traffic analyzer may receive the packet from the server and process the packet. Assume that the traffic analyzer determines, based on the initial packet (i.e., HTTP GET packet) and the response packet (i.e., the HTTP 200 OK packet), that the packets are HTTP packets associated with a HTTP traffic flow. The traffic analyzer may send the HTTP packets to the traffic processor, along with information identifying these packets as associated with a HTTP traffic flow. The traffic analyzer may also transmit the response packet to the client.

The traffic processor may determine whether the monitoring appliance is configured to monitor HTTP packets. In this case, the traffic processor determines that the monitoring appliance is configured to monitor HTTP packets because the table stores an entry indicating that HTTP packets are packets that should be mirrored and have their port numbers translated. In this case, the HTTP packet from the client included a port number of 5000. The traffic processor may replace the port number of 5000 with the port number of 80, as indicated in the table entry. The traffic processor may then transmit the packet to the monitoring appliance via interface port 5.

The monitoring appliance may receive the HTTP packet and perform some kind of operation on the packet. For example, the monitoring appliance may gather statistics, record activity, and/or analyze the packet for security purposes.

CONCLUSION

Communication trends continue to change today. For example, network traffic that has conventionally been transmitted to a particular port is now commonly transmitted via various ports. Also, standard ports may carry all kinds of traffic, including traffic that is unrelated to the traffic that conventionally has been transmitted to these ports. For example, SIP traffic has conventionally been transmitted to port 5060. Some devices may transmit SIP traffic to a port other than port 5060. Some devices may also transmit traffic other than SIP traffic to port 5060. This unconventional behavior may make it difficult to efficiently monitor network traffic.

Monitoring appliances perform detailed and processor-intensive operations on packets. Implementations described herein make efficient use of the monitoring appliances by sending the monitoring appliances only that traffic that the monitoring appliances are configured to monitor regardless of the ports to which this traffic is transmitted.

There has also been another communication trend in which multiple types of traffic are being tunneled (layered) via a common transport mechanism, such as HTTP. This may make it difficult to monitor the traffic being tunneled via the common transport mechanism. Implementations described herein may separate these different types of traffic from the common transport mechanism into different sub-streams and convert the formats of the data in the sub-streams into their native formats so that these sub-streams of traffic can be processed by the monitoring appliances.

The foregoing description provides illustration and description, but is not intended to be exhaustive or to limit the invention to the precise form disclosed. Modifications and variations are possible in light of the above teachings or may be acquired from practice of the invention.

For example, while a series of blocks has been described with regard to FIG. 8, the order of the blocks may be modified in other implementations. Further, non-dependent blocks may be performed in parallel.

Also, certain aspects have been described as being implemented as “logic” that performs one or more functions. This logic may include hardware, such as a processor, microprocessor, an ASIC, or a FPGA, or a combination of hardware and software, such as a processor/microprocessor executing instructions stored in a memory. Similarly, the term “component” may refer to hardware or a combination of hardware and software.

Further, the term “table,” as used herein, may refer to any searchable form or arrangement of data within a memory.

It will be apparent that aspects described herein may be implemented in many different forms of software, firmware, and hardware in the implementations illustrated in the figures. The actual software code or specialized control hardware used to implement aspects does not limit the embodiments. Thus, the operation and behavior of the aspects were described without reference to the specific software code—it being understood that software and control hardware can be designed to implement the aspects based on the description herein.

Even though particular combinations of features are recited in the claims and/or disclosed in the specification, these combinations are not intended to limit the disclosure of the invention. In fact, many of these features may be combined in ways not specifically recited in the claims and/or disclosed in the specification. Although each dependent claim listed below may directly depend on only one other claim, the disclosure of the invention includes each dependent claim in combination with every other claim in the claim set.

No element, act, or instruction used in the present application should be construed as critical or essential to the invention unless explicitly described as such. Also, as used herein, the article “a” is intended to include one or more items. Where only one item is intended, the term “one” or similar language is used. Further, the phrase “based on” is intended to mean “based, at least in part, on” unless explicitly stated otherwise. 

1. A device connected to a monitoring appliance configured to monitor a particular type of traffic flow that is associated with one of a plurality of ports of the device, the device comprising: a traffic analyzer to: identify a traffic flow, associated with a received data unit; and a traffic processor to: receive the data unit and information regarding the identified traffic flow from the traffic analyzer, determine that the identified traffic flow comprises the particular type of traffic flow to be monitored by the monitoring appliance based on the information, mirror the data unit, to form a mirrored data unit, based on the identified traffic flow comprising the particular type of traffic flow, determine that the data unit is associated with another one of the plurality of ports, change a port number associated with the mirrored data unit, to a particular port number based on the information and determining that the data unit is associated with the other one of the plurality of ports, where the particular port number is associated with the one of the plurality of ports, send the mirrored data unit to the monitoring appliance, and send the data unit to the other one of the plurality of ports.
 2. The device of claim 1, further comprising: a memory that includes an entry that identifies the identified traffic flow and identifies the particular port number.
 3. The device of claim 2, where the traffic processor is to determine that the identified traffic flow is to be monitored by the monitoring appliance when the memory includes the entry that identifies the identified traffic flow.
 4. The device of claim 2, where the traffic processor is to replace the port number in a header of the mirrored data unit with the particular port number identified in the entry of the memory.
 5. The device of claim 2, where the memory is user-configurable.
 6. The device of claim 1, where the traffic flow is associated with network traffic that includes a plurality of layered traffic flows, and where the traffic analyzer is further to: separate traffic flows of the plurality of layered traffic flows, and send each of the separated traffic flows to the traffic processor.
 7. The device of claim 6, where the data unit is associated with one of the separated traffic flows; and where the traffic processor is further to convert a format of the one of the separated traffic flows to another format prior to sending the mirrored data unit to the monitoring appliance.
 8. The device of claim 1, where the traffic analyzer includes a database of signatures associated with different types of traffic flows; and where, when identifying the traffic flow associated with the data unit, the traffic analyzer is to: identify a pattern associated with the traffic flow, and compare the pattern to the signatures in the database to determine whether the traffic flow matches one of the different types of traffic flows.
 9. The device of claim 1, where, when identifying the traffic flow associated with the data unit, the traffic analyzer is to identify the traffic flow based on information from a plurality of data units that includes the data unit.
 10. The device of claim 1, where, when identifying the traffic flow associated with the data unit, the traffic analyzer is to identify the traffic flow based on information from only the data unit.
 11. The device of claim 1, where the device includes at least one of a firewall, an intrusion detection system, a switch, or a router.
 12. A method performed by a device that is connected to a monitoring appliance configured to monitor a particular type of traffic flow associated with a particular port number, the method comprising: storing, as entries in a memory, information identifying a plurality of traffic flows and a corresponding plurality of port numbers, the plurality of port numbers including the particular port number, where each one of the entries stores information identifying one of the plurality of traffic flows and a corresponding one of the plurality of port numbers; identifying a traffic flow associated with a data unit received by the device; determining that the identified traffic flow is to be monitored by the monitoring appliance based on information associated with the identified traffic flow matching the one of the plurality of traffic flows in the memory; mirroring the data unit, to form a mirrored data unit, in response to determining that the traffic flow is to be monitored; determining that the data unit is associated with one of the plurality of port numbers other than the particular port number; replacing a port number associated with the mirrored data unit, with the corresponding one of the plurality of port numbers from the memory to create a modified mirrored data unit in response to determining that the data unit is associated with the one of the plurality of port numbers other than the particular port number; sending the modified mirrored data unit to the monitoring appliance; and sending the data unit to a port associated with the one of the plurality of port numbers.
 13. The method of claim 12, where replacing the port number, associated with the mirrored data unit, with the corresponding one of the plurality of port numbers includes overwriting the port number in a header of the mirrored data unit with the corresponding one of the plurality of port numbers from the memory.
 14. The method of claim 12, where the traffic flow is associated with network traffic that includes a plurality of layered traffic flows, and where the method further comprises demultiplexing traffic flows of the plurality of layered traffic flows.
 15. The method of claim 14, where determining that the information associated with the identified traffic flow matches the one of the plurality of traffic flows in the memory includes determining whether information associated with each of the demultiplexed traffic flows matches any of the plurality of traffic flows in the memory.
 16. The method of claim 14, further comprising: converting a format of one of the demultiplexed traffic flows to another format.
 17. The method of claim 12, further comprising: providing a database of signatures associated with different types of traffic flows; and where identifying the traffic flow associated with the data unit includes: identifying a pattern, an expression, or a string associated with the traffic flow, and comparing the pattern, the expression, or the string to the signatures in the database to determine whether the traffic flow matches one of the different types of traffic flows.
 18. The method of claim 12, where identifying the traffic flow associated with the data unit includes identifying the traffic flow based on information from a plurality of data units associated with the traffic flow.
 19. The method of claim 12, where identifying the traffic flow associated with the data unit includes identifying the traffic flow based on information from only the data unit.
 20. A system, comprising: a device to: receive network traffic, where the network traffic includes a plurality of different traffic flows tunneled via a common transport protocol, separate the plurality of different traffic flows from the network traffic to create a plurality of separate traffic flows, determine that a monitoring appliance, connected to the device, is to monitor one of the plurality of separate traffic flows, where the monitoring appliance is to monitor a particular type of traffic flow associated with a particular port number; mirror the one of the plurality of separate traffic flows based on determining that the monitoring appliance is to monitor the one of the plurality of separate traffic flows, replace a port number, associated with the mirrored one of the plurality of separate traffic flows, with the particular port number to create a modified mirrored traffic flow, send the modified mirrored traffic flow to the monitoring appliance, and send the one of the plurality of separate traffic flows to a port associated with the port number.
 21. The system of claim 20, where the device includes at least one of a firewall, an intrusion detection system, a switch, or a router.
 22. The system of claim 20, where the device is further to: store, as entries in a memory, information identifying a plurality of traffic flows and a corresponding plurality of port numbers, where one of the entries stores information identifying one of the plurality of traffic flows and a corresponding one of the plurality of port numbers, and where the one of the plurality of separate traffic flows corresponds to the one of the plurality of traffic flows, and the particular port number corresponds to the one of the plurality of port numbers.
 23. The system of claim 20, further comprising: a database of signatures associated with different types of traffic flows; and where the device is further to: identify, for each of the plurality of separate traffic flows, at least one of a pattern, an expression, or a string associated with the separate traffic flow, and compare, for each of the separate traffic flows, at least one of the pattern, the expression, or the string to the signatures in the database to determine whether the separate traffic flow matches one of the different types of traffic flows.
 24. The system of claim 20, where, when replacing the port number, the device is further to: overwrite the port number in a header of a data unit, associated with the mirrored one of the plurality of separate traffic flows, with the particular port number.
 25. The system of claim 20, where the device is further to: convert a format of the modified mirrored traffic flow to another format prior to sending the modified mirrored traffic flow to the monitoring appliance. 