Full Packet Capture¶
Security Onion writes network traffic to disk for full packet capture using Suricata.
Suricata writes standard PCAP files which can be copied off to another system and then opened with any standard libpcap tool.
Analysis¶
You can access full packet capture via the PCAP interface:
Alerts, Dashboards, and Hunt allow you to easily pivot to the PCAP interface.
Configuration¶
You can configure full packet capture by going to Administration --> Configuration --> Suricata --> config --> pcap.
Conditional PCAP¶
By default, Suricata writes all network traffic to PCAP. If you would like to limit Suricata to only writing PCAP when certain conditions are met, you can go to Administration --> Configuration --> Suricata -> config -> pcap -> conditional and change it to to either alerts or tag:
all: Capture all packets seen by Suricata (default).alerts: Capture only packets associated with a NIDS alert.tag: Capture packets based on a rule that is tagged.
PCAP Configuration Options¶
Here are some other PCAP configuration options that can be found at Administration --> Configuration --> Suricata -> config -> pcap. Some settings are considered advanced settings so you will only see them if you enable the Show advanced settings option.
enabled: Click the slider to enable or disable Suricata packet capture.compression: Set tononeto disable compression. Set tolz4to enable lz4 compression but note that this requires more CPU cycles.lz4-level: lz4 compression level of PCAP files. Set to0for no compression. Set to16for maximum compression.maxsize: Maximum size in GB for total disk usage of all PCAP files written by Suricata. You may need to adjust this value based on your disk space and desired PCAP retention.filesize: Maximum file size for individual PCAP files written by Suricata. Increasing this number could improve write performance at the expense of PCAP retrieval time.use-stream-depth: Set tonoto ignore the stream depth and capture the entire flow. Set toyesto truncate the flow based on the stream depth.
VLAN Tags¶
If your network traffic has VLAN tags, then Suricata will log them. For more information, please see the Suricata section.
Diagnostic Logging¶
Diagnostic logging for Suricata can be found at /opt/so/log/suricata/suricata.log. Depending on what you're looking for, you may also need to look at the Docker logs for the container:

