We have a setup where Suricata (5.0.2) is running only as IDS and is receiving mirrored traffic via VXLAN protocol. We noticed that there is an ICMP traffic wrapped in VXLAN generated by Suricata that is flowing back to the instance that VXLAN is mirrored from. Tested this by running process without Suricata and with Suricata.
VXLAN + ICMP traffic has properties:
My question is why we are seeing this traffic? Can Suricata be configured to disable sending traffic back to instance?
Edit 1
We are using AWS services. Topology:
We only have alert
rules.
Suricata is being configured:
./configure --enable-nfqueue \
--enable-python \
--enable-lua \
--with-libnetfilter_queue-libraries=...
--with-libnetfilter_queue-includes=...
--with-libhs-includes=...
--with-libhs-libraries=...
--with-liblua-includes=...
--with-liblua-libraries=...
--with-libnet-libraries=...
--with-libnet-includes=...
--with-libnspr-libraries=...
--with-libnspr-includes=...
--with-libnss-libraries=...
--with-libnss-includes=...
--disable-gccmarch-native \
"--prefix=..."