We are trying to use UDP spoofing to forward unaltered syslog events to a SIEM collector. We tried using the RFC 3164 headers first, but there still seems to be some extraneous information added to the messages.
The Kiwi Syslog server is running as a VM on a VMWare ESX server. When using the Kiwi syslog server dialog box, the default adapter is some VPN dialup adapter, the secondary choice is actually the VMWare adapter. The Kiwi server has been running successfully with the current configuration for a while, collecting events from Windows servers via SNARE and Cisco ASA FW and FWSMs.
When we try to check the box for UDP spoofing and select the VMWare adapter, we receive an error message stating that the default GW MAC could not be resolved. The test also fails, of course.
This seems confusing since we were successfully sending UDP on port 514 earlier in the day with no problems.
What is different with the UDP spoffing packets that could confuse the virtual switch? Can someone describe the actual packet format, and what MAC and IP address are used? I would assume the MAC address would be the MAC of the switch port that the Kiwi host would use to get to the original source host, and the IP address would be "spoofed" to look like the original source host. IS this a correct assumption?
If so, wouldnt the host IP address be associated with two separate switch ports in the bridging table? 1 for the upstream port to the actual location, and 1 for the port that is spoofing the address?