GSP
Quick Navigator

Search Site

Unix VPS
A - Starter
B - Basic
C - Preferred
D - Commercial
MPS - Dedicated
Previous VPSs
* Sign Up! *

Support
Contact Us
Online Help
Handbooks
Domain Status
Man Pages

FAQ
Virtual Servers
Pricing
Billing
Technical

Network
Facilities
Connectivity
Topology Map

Miscellaneous
Server Agreement
Year 2038
Credits
 

USA Flag

 

 

Man Pages
radtunnel(1) FreeBSD General Commands Manual (axa) radtunnel(1)

radtunnelRealtime Anomaly Detection (RAD) Tunnel

radtunnel [-dhIOptVz] -a anomaly -o out-addr -s RAD-server -w watch
[-A interval] [-C count] [-E ciphers] [-k cmd] -m sampling-rate [-n config-file] [-P pidfile] [-r rate-limit] [-T secs] [-Z size]

radtunnel transfers selected Security Information Exchange (SIE) data from Real-time Anomaly Detector (RAD) servers to the local network. The connection to the server is created and restored after problems with binary exponential delays between retries.

radtunnel is a tool for tunneling SIE data using the Advanced Exchange Access (AXA) protocol. It also demonstrates the use of the AXA helper library, libaxa.a.

The following arguments are available:

interval
specifies the accounting interval. Every interval seconds an accounting request will be made to server and the results will be emitted to stdout. When specifying this mode, you also need to specify -d at the command line.
anomaly [parameters]
specifies RAD anomaly detection module and its parameters. There must be at least one -a in RAD mode.
count
stop radtunnel or (with -k specified) close the current output and reopen a new output after count payloads have been processed.
enable debugging reports or increase them after the first -d.
ciphers
specifies a list ciphers for apikey connections.
display options summary.
enables insecure mode for apikey authentication. When enabled, client connections will not be performed via TLS.
cmd
enables kicker mode and makes -C , -T or -Z continuous. In this mode output file names are suffixed with a timestamp and radtunnel runs continuously, rotating output files as payload counts or the output file size exceeds a threshold or time intervals expire. cmd specifies the command to run on output files after rotation. If cmd is set to the empty string '', then no command is executed and only file rotation is performed.

This option must be combined with either -C , -T or -Z. Only nmsg file-based outputs are supported.

sampling-rate
specifies the sampling rate. Sets the percentage (between 0.1 and 100.0) that the RAD server will send.
config-file
specify location for AXA client configuration file.
enable a spinning bar output indicator on stdout.
append output to specified file (only valid for nmsg file-based outputs).
out-addr
specifies the destination of the SIE data. It can be forwarded as nmsg messages to a UDP or TCP port or as raw IP packets to a file, FIFO, or network interface.
nmsg:[tcp:|udp:]host,port
sends nmsg messages to the UDP or optional TCP host name and port number host,port. UDP is the default. IP packets are converted to NMSG messages.
nmsg:file:path
sends binary nmsg messages to the file named path. IP packets are converted to nmsg messages.
nmsg:file_json:path
sends nmsg newline-delimited json blobs to the file named path. Note that newline-delimited json outputs can incur a slight performance penalty versus binary nmsg outputs for "high-velocity" outputs. This is because the underlying nmsg json output object is unbuffered and results a filesystem write for every forwarded nmsg.
pcap[-fifo]:path
sends IP packets to a file or FIFO named path for examination with tcpdump(1) or another packet tracing tool. An ordinary file is the default. Only IP packets but not nmsg messages are sent.
pcap-if:[dst/]ifname
transmits IP packets on the network interface named ifname for examination with tcpdump(1) or another packet tracing tool. dst optionally specifies a destination 48-bit Ethernet address other than all 0:0:0:0:0:0 default. This output usually requires that radtunnel be run by root. Only IP packets but not nmsg messages are sent.
pidfile
will result in the current PID being written to pidfile. The file will be deleted upon program exit.
rate-limit
tells the server to send at most rate-limit SIE messages and raw IP packets per second.
server
specifies the server that is the source of the SIE data. The server can be specified with any of the following:
Sm off alias Sm on
Connect to a server using an alias shortcut mnemonic (see FILES section for more information).
Sm off apikey: <users_apikey>@ host,port Sm on
Identify and authenticate the user via a Farsight Security provided apikey. The connection will be encrypted using the TLS protocol.
Sm off tcp: user@ host,port Sm on
The connection will be made with the host name or IP address and port number using clear text over TCP/IP.
Sm off unix: user@ /ud/socket Sm on
This connection uses a UNIX domain socket connected to a local server.
secs
stop radtunnel or (with -k specified) close the current output and reopen a new output on a time interval modulo the secs parameter. For example, -t 3600 means an hour after started or reopened.
enable tracing reports on the server or increase them after the first -t.
displays the version of radtunnel and its preferred version of the AXA protocol.
watch
There must be at least one -w with a RAD watch to specify the interesting SIE messages or dark channel IP packets. The optional [(shared)] suffix marks IP addresses or domains that are not exclusively used by the RAD client.
 
ip=IP[/n]
The IPv4 or IPv6 address IP specifies a host address unless a prefix length is specified.
 
dns=[*.]dom
watches for the domain anywhere in the IP packets or SIE messages on the enabled channels. A wild card watches for occurrences of the domain and all sub-domains.

In addition, (shared) can be appended to IP and file ... dns watches to indicate addresses or domains that are not used exclusively.

enable nmsg zlib container compression.
size
stop radtunnel or (with -k specified) close the current output and reopen a new output after the output file meets or exceeds size. This mode may only be used with file-based outputs. Additionally, because nmsg-based file outputs are by default buffered, it is recommended when writing to one that this option be used in unbuffered mode ( -u ).

The following connects to a RAD server at example.com, loads the Brand module looking for the brand "farsight", and sends all anomaly hit nmsgs to the local UDP port 8000 on 127.0.0.1:

radtunnel -s apikey:<yourapikey>@example.com,1012 -o nmsg:127.1,8000 \
	-w dns=*. -a brand brand=farsight

~/.axa/config
contains AXA client configuration data. Currently supported are connection aliases that provide the user with a facility to create shortcut mnemonics to specify the RAD server connection string. For example:
$ cat ~/.axa/config
# RAD
alias:rad-apikey=apikey:<yourapikey>@example.com,1012

    
If the user wanted to connect to RAD, she would only have to remember "rad-apikey" and could do:
$ radtunnel -s rad-apikey ...

This config file is shared for radtunnel, sratunnel, radtool, and sratool. Because this file can contain sensitive information such as apikeys, it must not be readable or writeable to anybody other than "owner" or radtunnel will not load.

If set, AXACONF specifies the AXA configuration directory instead of the default, ~/.axa or /usr/local/etc/axa.

On operating systems that support SIGINFO (including BSDish systems like FreeBSD and macOS), the user can type "ctrl-t" at the command line during a running radtunnel process and get information about the session. For example:

^Trad connected, sent 4 messages, received 176 messages, 176 hits

Note that by default, an additional line of information is printed by the kernel (system load and process information):
^Tload: 1.39  cmd: radtunnel 7060 running 0.06u 0.00s
rad connected, sent 4 messages, received 304 messages, 304 hits

This can be disabled via: stty nokerninfo. Example:
$ radtunnel -A 10 -d -s rad-apikey...
connecting to rad-apikey...
^Tload: 1.39  cmd: radtunnel 7060 running 0.06u 0.00s
rad connected, sent 4 messages, received 304 messages, 304 hits
^C
$ stty nokerninfo
$ radtunnel -A 10 -d -s rad-apikey...
connecting to rad-apikey...
^Trad connected, sent 4 messages, received 176 messages, 176 hits
^Trad connected, sent 4 messages, received 416 messages, 416 hits

sratunnel(1), sratool(1), radtool(1), mkfifo(1), and nmsgtool(1).

July 10, 2025 FreeBSD 14.3-RELEASE

Search for    or go to Top of page |  Section 1 |  Main Index

Powered by GSP Visit the GSP FreeBSD Man Page Interface.
Output converted with ManDoc.