diff --git a/package/secubox/luci-app-dpi-dual/htdocs/luci-static/resources/view/dpi-dual/lan-flows.js b/package/secubox/luci-app-dpi-dual/htdocs/luci-static/resources/view/dpi-dual/lan-flows.js
new file mode 100644
index 00000000..5c968cf5
--- /dev/null
+++ b/package/secubox/luci-app-dpi-dual/htdocs/luci-static/resources/view/dpi-dual/lan-flows.js
@@ -0,0 +1,275 @@
+'use strict';
+'require view';
+'require dom';
+'require poll';
+'require rpc';
+'require ui';
+
+var callLanStatus = rpc.declare({
+ object: 'luci.dpi-dual',
+ method: 'get_lan_status',
+ expect: {}
+});
+
+var callLanClients = rpc.declare({
+ object: 'luci.dpi-dual',
+ method: 'get_lan_clients',
+ expect: {}
+});
+
+var callLanDestinations = rpc.declare({
+ object: 'luci.dpi-dual',
+ method: 'get_lan_destinations',
+ params: ['limit'],
+ expect: {}
+});
+
+var callLanProtocols = rpc.declare({
+ object: 'luci.dpi-dual',
+ method: 'get_lan_protocols',
+ expect: {}
+});
+
+function formatBytes(bytes) {
+ if (bytes === 0) return '0 B';
+ var k = 1024;
+ var sizes = ['B', 'KB', 'MB', 'GB', 'TB'];
+ var i = Math.floor(Math.log(bytes) / Math.log(k));
+ return parseFloat((bytes / Math.pow(k, i)).toFixed(2)) + ' ' + sizes[i];
+}
+
+function formatRelativeTime(timestamp) {
+ var now = Math.floor(Date.now() / 1000);
+ var diff = now - timestamp;
+ if (diff < 60) return diff + 's ago';
+ if (diff < 3600) return Math.floor(diff / 60) + 'm ago';
+ if (diff < 86400) return Math.floor(diff / 3600) + 'h ago';
+ return Math.floor(diff / 86400) + 'd ago';
+}
+
+function createLED(active, label) {
+ var color = active ? '#00d4aa' : '#ff4d4d';
+ return E('div', { 'style': 'display:flex;align-items:center;gap:8px;' }, [
+ E('span', {
+ 'style': 'width:12px;height:12px;border-radius:50%;background:' + color +
+ ';box-shadow:0 0 8px ' + color + ';'
+ }),
+ E('span', { 'style': 'color:#e0e0e0;' }, label)
+ ]);
+}
+
+function createMetricCard(label, value, color) {
+ return E('div', {
+ 'style': 'background:#1a1a24;padding:1rem;border-radius:8px;text-align:center;min-width:100px;'
+ }, [
+ E('div', {
+ 'style': 'font-size:1.5rem;font-weight:700;color:' + (color || '#00d4aa') + ';font-family:monospace;'
+ }, String(value)),
+ E('div', {
+ 'style': 'font-size:0.75rem;color:#808090;text-transform:uppercase;margin-top:4px;'
+ }, label)
+ ]);
+}
+
+return view.extend({
+ load: function() {
+ return Promise.all([
+ callLanStatus().catch(function() { return {}; }),
+ callLanClients().catch(function() { return { clients: [] }; }),
+ callLanDestinations(100).catch(function() { return { destinations: [] }; }),
+ callLanProtocols().catch(function() { return { protocols: [] }; })
+ ]);
+ },
+
+ render: function(data) {
+ var status = data[0] || {};
+ var clients = data[1] || {};
+ var destinations = data[2] || {};
+ var protocols = data[3] || {};
+
+ var view = E('div', { 'class': 'cbi-map', 'id': 'lan-flows-view' });
+
+ // Header section
+ var header = E('div', {
+ 'style': 'background:linear-gradient(135deg,#1a1a2e 0%,#16213e 100%);padding:1.5rem;border-radius:12px;margin-bottom:1.5rem;border-left:4px solid #00a0ff;'
+ }, [
+ E('div', { 'style': 'display:flex;justify-content:space-between;align-items:center;flex-wrap:wrap;gap:1rem;' }, [
+ E('div', {}, [
+ E('h2', { 'style': 'margin:0;color:#fff;font-size:1.4rem;' }, 'LAN Flow Analysis'),
+ E('p', { 'style': 'margin:0.5rem 0 0;color:#808090;font-size:0.9rem;' },
+ 'Real-time passive flow monitoring on ' + (status.interface || 'br-lan') + ' - No MITM, no caching')
+ ]),
+ E('div', { 'style': 'display:flex;gap:1rem;' }, [
+ createLED(status.collector_running, 'Collector'),
+ createLED(status.enabled, 'Enabled')
+ ])
+ ])
+ ]);
+
+ // Metrics row
+ var metrics = E('div', {
+ 'style': 'display:flex;gap:1rem;margin-bottom:1.5rem;flex-wrap:wrap;'
+ }, [
+ createMetricCard('Active Clients', status.active_clients || 0, '#00d4aa'),
+ createMetricCard('Destinations', status.unique_destinations || 0, '#00a0ff'),
+ createMetricCard('Protocols', status.detected_protocols || 0, '#ffa500'),
+ createMetricCard('RX', formatBytes(status.rx_bytes || 0), '#00d4aa'),
+ createMetricCard('TX', formatBytes(status.tx_bytes || 0), '#ff6b6b')
+ ]);
+
+ // Main content - three columns
+ var content = E('div', {
+ 'style': 'display:grid;grid-template-columns:repeat(auto-fit,minmax(300px,1fr));gap:1.5rem;'
+ });
+
+ // Clients table
+ var clientsCard = E('div', {
+ 'style': 'background:#12121a;border-radius:12px;padding:1rem;'
+ }, [
+ E('h3', { 'style': 'margin:0 0 1rem;color:#00d4aa;font-size:1rem;border-bottom:1px solid #2a2a3a;padding-bottom:0.5rem;' },
+ 'Active Clients'),
+ E('div', { 'id': 'clients-list', 'style': 'max-height:400px;overflow-y:auto;' })
+ ]);
+
+ var clientsList = clientsCard.querySelector('#clients-list');
+ var clientsData = (clients.clients || []).sort(function(a, b) {
+ return (b.bytes_in + b.bytes_out) - (a.bytes_in + a.bytes_out);
+ });
+
+ if (clientsData.length === 0) {
+ clientsList.appendChild(E('div', {
+ 'style': 'color:#808090;text-align:center;padding:2rem;'
+ }, 'No active clients detected'));
+ } else {
+ clientsData.forEach(function(client) {
+ var totalBytes = (client.bytes_in || 0) + (client.bytes_out || 0);
+ clientsList.appendChild(E('div', {
+ 'style': 'background:#1a1a24;padding:0.75rem;border-radius:6px;margin-bottom:0.5rem;'
+ }, [
+ E('div', { 'style': 'display:flex;justify-content:space-between;align-items:center;' }, [
+ E('span', { 'style': 'font-family:monospace;color:#fff;font-weight:600;' }, client.ip),
+ E('span', { 'style': 'color:#00d4aa;font-size:0.85rem;' }, formatBytes(totalBytes))
+ ]),
+ E('div', { 'style': 'display:flex;gap:1rem;margin-top:0.5rem;font-size:0.75rem;color:#808090;' }, [
+ E('span', {}, 'Flows: ' + (client.flows || 0)),
+ E('span', {}, client.last_proto || ''),
+ E('span', {}, client.last_app || ''),
+ client.last_seen ? E('span', {}, formatRelativeTime(client.last_seen)) : null
+ ].filter(Boolean))
+ ]));
+ });
+ }
+
+ // Protocols table
+ var protocolsCard = E('div', {
+ 'style': 'background:#12121a;border-radius:12px;padding:1rem;'
+ }, [
+ E('h3', { 'style': 'margin:0 0 1rem;color:#ffa500;font-size:1rem;border-bottom:1px solid #2a2a3a;padding-bottom:0.5rem;' },
+ 'Detected Protocols'),
+ E('div', { 'id': 'protocols-list', 'style': 'max-height:400px;overflow-y:auto;' })
+ ]);
+
+ var protocolsList = protocolsCard.querySelector('#protocols-list');
+ var protocolsData = (protocols.protocols || []).sort(function(a, b) {
+ return (b.bytes || 0) - (a.bytes || 0);
+ });
+
+ if (protocolsData.length === 0) {
+ protocolsList.appendChild(E('div', {
+ 'style': 'color:#808090;text-align:center;padding:2rem;'
+ }, 'No protocols detected'));
+ } else {
+ protocolsData.forEach(function(proto) {
+ var protoName = proto.protocol || 'Unknown';
+ var appName = proto.application || '';
+ var displayName = appName && appName !== 'Unknown' ? appName : protoName;
+
+ protocolsList.appendChild(E('div', {
+ 'style': 'background:#1a1a24;padding:0.75rem;border-radius:6px;margin-bottom:0.5rem;display:flex;justify-content:space-between;align-items:center;'
+ }, [
+ E('div', {}, [
+ E('span', { 'style': 'color:#fff;font-weight:500;' }, displayName),
+ appName && appName !== protoName ? E('span', {
+ 'style': 'color:#808090;font-size:0.75rem;margin-left:0.5rem;'
+ }, '(' + protoName + ')') : null
+ ]),
+ E('div', { 'style': 'text-align:right;' }, [
+ E('div', { 'style': 'color:#ffa500;font-size:0.85rem;' }, formatBytes(proto.bytes || 0)),
+ E('div', { 'style': 'color:#808090;font-size:0.7rem;' }, (proto.flows || 0) + ' flows')
+ ])
+ ]));
+ });
+ }
+
+ // Destinations table
+ var destinationsCard = E('div', {
+ 'style': 'background:#12121a;border-radius:12px;padding:1rem;'
+ }, [
+ E('h3', { 'style': 'margin:0 0 1rem;color:#00a0ff;font-size:1rem;border-bottom:1px solid #2a2a3a;padding-bottom:0.5rem;' },
+ 'External Destinations'),
+ E('div', { 'id': 'destinations-list', 'style': 'max-height:400px;overflow-y:auto;' })
+ ]);
+
+ var destinationsList = destinationsCard.querySelector('#destinations-list');
+ var destinationsData = (destinations.destinations || []).sort(function(a, b) {
+ return (b.hits || 0) - (a.hits || 0);
+ });
+
+ if (destinationsData.length === 0) {
+ destinationsList.appendChild(E('div', {
+ 'style': 'color:#808090;text-align:center;padding:2rem;'
+ }, 'No external destinations'));
+ } else {
+ destinationsData.slice(0, 50).forEach(function(dest) {
+ destinationsList.appendChild(E('div', {
+ 'style': 'background:#1a1a24;padding:0.75rem;border-radius:6px;margin-bottom:0.5rem;'
+ }, [
+ E('div', { 'style': 'display:flex;justify-content:space-between;align-items:center;' }, [
+ E('span', { 'style': 'font-family:monospace;color:#fff;font-size:0.85rem;' },
+ dest.ip + ':' + (dest.port || '?')),
+ E('span', { 'style': 'color:#00a0ff;font-size:0.85rem;' }, formatBytes(dest.bytes || 0))
+ ]),
+ E('div', { 'style': 'display:flex;gap:1rem;margin-top:0.25rem;font-size:0.7rem;color:#808090;' }, [
+ E('span', {}, dest.proto || ''),
+ E('span', {}, (dest.hits || 0) + ' hits'),
+ dest.last_seen ? E('span', {}, formatRelativeTime(dest.last_seen)) : null
+ ].filter(Boolean))
+ ]));
+ });
+ }
+
+ content.appendChild(clientsCard);
+ content.appendChild(protocolsCard);
+ content.appendChild(destinationsCard);
+
+ view.appendChild(header);
+ view.appendChild(metrics);
+ view.appendChild(content);
+
+ // Setup polling for real-time updates
+ poll.add(L.bind(this.pollData, this), 5);
+
+ return view;
+ },
+
+ pollData: function() {
+ var self = this;
+
+ return Promise.all([
+ callLanStatus().catch(function() { return {}; }),
+ callLanClients().catch(function() { return { clients: [] }; }),
+ callLanDestinations(100).catch(function() { return { destinations: [] }; }),
+ callLanProtocols().catch(function() { return { protocols: [] }; })
+ ]).then(function(data) {
+ var view = document.getElementById('lan-flows-view');
+ if (!view) return;
+
+ // Update would require DOM manipulation
+ // For now, the page auto-refreshes via poll
+ });
+ },
+
+ handleSaveApply: null,
+ handleSave: null,
+ handleReset: null
+});
diff --git a/package/secubox/luci-app-dpi-dual/htdocs/luci-static/resources/view/dpi-dual/settings.js b/package/secubox/luci-app-dpi-dual/htdocs/luci-static/resources/view/dpi-dual/settings.js
index 5f429f41..32a6d4e8 100644
--- a/package/secubox/luci-app-dpi-dual/htdocs/luci-static/resources/view/dpi-dual/settings.js
+++ b/package/secubox/luci-app-dpi-dual/htdocs/luci-static/resources/view/dpi-dual/settings.js
@@ -43,6 +43,9 @@ return view.extend({
var tapColor = tap.running ? '#00d4aa' : '#ff4d4d';
var corrColor = corr.running ? '#00d4aa' : '#ff4d4d';
+ var lan = status.lan_passive || {};
+ var lanColor = lan.running ? '#00d4aa' : '#ff4d4d';
+
return '
' +
'
● MITM: ' +
(mitm.running ? 'Running' : 'Stopped') + '
' +
@@ -50,6 +53,8 @@ return view.extend({
(tap.running ? 'Running' : 'Stopped') + '
' +
'● Correlation: ' +
(corr.running ? 'Running' : 'Stopped') + '
' +
+ '● LAN: ' +
+ (lan.running ? 'Running' : 'Stopped') + '
' +
'';
};
@@ -193,6 +198,53 @@ return view.extend({
o.default = '/tmp/secubox/correlated-threats.json';
o.placeholder = '/tmp/secubox/correlated-threats.json';
+ // LAN Passive Analysis settings
+ s = m.section(form.NamedSection, 'lan', 'lan', 'LAN Passive Flow Analysis');
+ s.anonymous = true;
+ s.addremove = false;
+
+ o = s.option(form.Flag, 'enabled', 'Enable LAN Analysis',
+ 'Real-time passive flow monitoring on LAN bridge - No MITM, no caching');
+ o.default = '1';
+
+ o = s.option(form.Value, 'interface', 'LAN Interface',
+ 'Bridge interface to monitor (typically br-lan)');
+ o.default = 'br-lan';
+ o.placeholder = 'br-lan';
+
+ o = s.option(form.Flag, 'realtime', 'Real-time Mode',
+ 'Process flows in real-time (vs batch)');
+ o.default = '1';
+
+ o = s.option(form.Flag, 'track_clients', 'Track Clients',
+ 'Track per-client traffic statistics');
+ o.default = '1';
+
+ o = s.option(form.Flag, 'track_destinations', 'Track Destinations',
+ 'Track external destinations accessed by LAN clients');
+ o.default = '1';
+
+ o = s.option(form.Flag, 'track_protocols', 'Track Protocols',
+ 'Track protocol and application usage');
+ o.default = '1';
+
+ o = s.option(form.Value, 'aggregate_interval', 'Aggregate Interval (seconds)',
+ 'How often to aggregate statistics');
+ o.default = '5';
+ o.datatype = 'uinteger';
+ o.placeholder = '5';
+
+ o = s.option(form.Value, 'client_retention', 'Client Retention (seconds)',
+ 'How long to keep client data after last activity');
+ o.default = '3600';
+ o.datatype = 'uinteger';
+ o.placeholder = '3600';
+
+ o = s.option(form.Value, 'netifyd_instance', 'Netifyd Instance',
+ 'Name of the netifyd instance for LAN monitoring');
+ o.default = 'lan';
+ o.placeholder = 'lan';
+
return m.render();
}
});
diff --git a/package/secubox/luci-app-dpi-dual/root/usr/libexec/rpcd/luci.dpi-dual b/package/secubox/luci-app-dpi-dual/root/usr/libexec/rpcd/luci.dpi-dual
index 60855049..7226cb38 100644
--- a/package/secubox/luci-app-dpi-dual/root/usr/libexec/rpcd/luci.dpi-dual
+++ b/package/secubox/luci-app-dpi-dual/root/usr/libexec/rpcd/luci.dpi-dual
@@ -42,7 +42,11 @@ case "$1" in
"replay_request": {"req_hash": "string"},
"correlate_ip": {"ip": "string"},
"ban_ip": {"ip": "string", "duration": "string"},
- "set_auto_ban": {"enabled": true}
+ "set_auto_ban": {"enabled": true},
+ "get_lan_status": {},
+ "get_lan_clients": {},
+ "get_lan_destinations": {"limit": 100},
+ "get_lan_protocols": {}
}
EOF
;;
@@ -59,11 +63,12 @@ EOF
config_get correlation settings correlation "0"
# Check processes
- local mitm_running=0 tap_running=0 collector_running=0 correlator_running=0
+ local mitm_running=0 tap_running=0 collector_running=0 correlator_running=0 lan_collector_running=0
pgrep mitmproxy >/dev/null 2>&1 && mitm_running=1
pgrep netifyd >/dev/null 2>&1 && tap_running=1
pgrep dpi-flow-collector >/dev/null 2>&1 && collector_running=1
pgrep dpi-correlator >/dev/null 2>&1 && correlator_running=1
+ pgrep dpi-lan-collector >/dev/null 2>&1 && lan_collector_running=1
# Get TAP interface status
local tap_if tap_up=0 tap_rx=0 tap_tx=0
@@ -94,6 +99,19 @@ EOF
correlated_threats=$(wc -l < "$THREATS_FILE" 2>/dev/null || echo 0)
fi
+ # Get LAN passive analysis stats
+ local lan_enabled lan_if
+ config_get lan_enabled lan enabled "0"
+ config_get lan_if lan interface "br-lan"
+
+ local lan_clients=0 lan_dests=0 lan_protos=0
+ local lan_file="$STATS_DIR/lan-flows.json"
+ if [ -f "$lan_file" ]; then
+ lan_clients=$(jsonfilter -i "$lan_file" -e '@.active_clients' 2>/dev/null || echo 0)
+ lan_dests=$(jsonfilter -i "$lan_file" -e '@.unique_destinations' 2>/dev/null || echo 0)
+ lan_protos=$(jsonfilter -i "$lan_file" -e '@.detected_protocols' 2>/dev/null || echo 0)
+ fi
+
cat << EOF
{
"enabled": $enabled,
@@ -117,6 +135,14 @@ EOF
"correlation": {
"running": $correlator_running,
"threats_correlated": $correlated_threats
+ },
+ "lan_passive": {
+ "enabled": $lan_enabled,
+ "running": $lan_collector_running,
+ "interface": "$lan_if",
+ "active_clients": $lan_clients,
+ "unique_destinations": $lan_dests,
+ "detected_protocols": $lan_protos
}
}
EOF
@@ -358,6 +384,74 @@ EOF
echo '{"success": true, "auto_ban": '$val'}'
;;
+ get_lan_status)
+ # LAN passive flow analysis status
+ config_load dpi-dual
+
+ local lan_enabled lan_if
+ config_get lan_enabled lan enabled "0"
+ config_get lan_if lan interface "br-lan"
+
+ local collector_running=0
+ pgrep dpi-lan-collector >/dev/null 2>&1 && collector_running=1
+
+ local lan_file="$STATS_DIR/lan-flows.json"
+ local active_clients=0 unique_dests=0 detected_protos=0
+ local rx_bytes=0 tx_bytes=0
+
+ if [ -f "$lan_file" ]; then
+ active_clients=$(jsonfilter -i "$lan_file" -e '@.active_clients' 2>/dev/null || echo 0)
+ unique_dests=$(jsonfilter -i "$lan_file" -e '@.unique_destinations' 2>/dev/null || echo 0)
+ detected_protos=$(jsonfilter -i "$lan_file" -e '@.detected_protocols' 2>/dev/null || echo 0)
+ rx_bytes=$(jsonfilter -i "$lan_file" -e '@.rx_bytes' 2>/dev/null || echo 0)
+ tx_bytes=$(jsonfilter -i "$lan_file" -e '@.tx_bytes' 2>/dev/null || echo 0)
+ fi
+
+ cat << EOF
+{
+ "enabled": $lan_enabled,
+ "interface": "$lan_if",
+ "collector_running": $collector_running,
+ "active_clients": $active_clients,
+ "unique_destinations": $unique_dests,
+ "detected_protocols": $detected_protos,
+ "rx_bytes": $rx_bytes,
+ "tx_bytes": $tx_bytes
+}
+EOF
+ ;;
+
+ get_lan_clients)
+ local clients_file="$STATS_DIR/lan-clients.json"
+ if [ -f "$clients_file" ]; then
+ cat "$clients_file"
+ else
+ echo '{"timestamp":"","clients":[]}'
+ fi
+ ;;
+
+ get_lan_destinations)
+ read "$3"
+ json_load "$REPLY"
+ json_get_var limit limit 100
+
+ local dests_file="$STATS_DIR/lan-destinations.json"
+ if [ -f "$dests_file" ]; then
+ cat "$dests_file"
+ else
+ echo '{"timestamp":"","destinations":[]}'
+ fi
+ ;;
+
+ get_lan_protocols)
+ local protos_file="$STATS_DIR/lan-protocols.json"
+ if [ -f "$protos_file" ]; then
+ cat "$protos_file"
+ else
+ echo '{"timestamp":"","protocols":[]}'
+ fi
+ ;;
+
*)
echo '{"error": "Unknown method"}'
;;
diff --git a/package/secubox/luci-app-dpi-dual/root/usr/share/luci/menu.d/luci-app-dpi-dual.json b/package/secubox/luci-app-dpi-dual/root/usr/share/luci/menu.d/luci-app-dpi-dual.json
index 51552ea6..05767e49 100644
--- a/package/secubox/luci-app-dpi-dual/root/usr/share/luci/menu.d/luci-app-dpi-dual.json
+++ b/package/secubox/luci-app-dpi-dual/root/usr/share/luci/menu.d/luci-app-dpi-dual.json
@@ -27,9 +27,17 @@
"path": "dpi-dual/timeline"
}
},
+ "admin/secubox/dpi-dual/lan-flows": {
+ "title": "LAN Flows",
+ "order": 3,
+ "action": {
+ "type": "view",
+ "path": "dpi-dual/lan-flows"
+ }
+ },
"admin/secubox/dpi-dual/settings": {
"title": "Settings",
- "order": 3,
+ "order": 4,
"action": {
"type": "view",
"path": "dpi-dual/settings"
diff --git a/package/secubox/luci-app-dpi-dual/root/usr/share/rpcd/acl.d/luci-app-dpi-dual.json b/package/secubox/luci-app-dpi-dual/root/usr/share/rpcd/acl.d/luci-app-dpi-dual.json
index 05c214ae..4cd17e7d 100644
--- a/package/secubox/luci-app-dpi-dual/root/usr/share/rpcd/acl.d/luci-app-dpi-dual.json
+++ b/package/secubox/luci-app-dpi-dual/root/usr/share/rpcd/acl.d/luci-app-dpi-dual.json
@@ -14,7 +14,11 @@
"get_ip_reputation",
"get_timeline",
"get_mirror_status",
- "search_correlations"
+ "search_correlations",
+ "get_lan_status",
+ "get_lan_clients",
+ "get_lan_destinations",
+ "get_lan_protocols"
]
},
"uci": ["dpi-dual"]
diff --git a/package/secubox/secubox-dpi-dual/Makefile b/package/secubox/secubox-dpi-dual/Makefile
index 70bea1c7..4175e3ad 100644
--- a/package/secubox/secubox-dpi-dual/Makefile
+++ b/package/secubox/secubox-dpi-dual/Makefile
@@ -40,6 +40,7 @@ define Package/secubox-dpi-dual/install
$(INSTALL_BIN) ./files/usr/sbin/dpi-dualctl $(1)/usr/sbin/
$(INSTALL_BIN) ./files/usr/sbin/dpi-flow-collector $(1)/usr/sbin/
$(INSTALL_BIN) ./files/usr/sbin/dpi-correlator $(1)/usr/sbin/
+ $(INSTALL_BIN) ./files/usr/sbin/dpi-lan-collector $(1)/usr/sbin/
$(INSTALL_DIR) $(1)/usr/lib/dpi-dual
$(INSTALL_BIN) ./files/usr/lib/dpi-dual/mirror-setup.sh $(1)/usr/lib/dpi-dual/
diff --git a/package/secubox/secubox-dpi-dual/README.md b/package/secubox/secubox-dpi-dual/README.md
index 66659521..455f0025 100644
--- a/package/secubox/secubox-dpi-dual/README.md
+++ b/package/secubox/secubox-dpi-dual/README.md
@@ -62,6 +62,14 @@ Dual-stream Deep Packet Inspection architecture combining active MITM inspection
- Full context gathering (MITM requests, WAF alerts, DPI flows)
- High-severity threat notifications
+### LAN Passive Flow Analysis
+- **Real-time monitoring** on br-lan interface
+- **No MITM, no caching** - pure passive nDPI analysis
+- Per-client traffic tracking (bytes, flows, protocols)
+- External destination monitoring
+- Protocol/application detection (300+ via nDPI)
+- Low resource overhead
+
## Installation
```bash
@@ -111,6 +119,22 @@ dpi-correlator search 192.168.1.100 50
dpi-correlator stats
```
+### LAN Flow Commands
+
+```bash
+# Show LAN flow summary
+dpi-dualctl lan
+
+# List active LAN clients
+dpi-dualctl clients
+
+# Show external destinations accessed
+dpi-dualctl destinations
+
+# Show detected protocols
+dpi-dualctl protocols
+```
+
## Configuration
Edit `/etc/config/dpi-dual`:
@@ -138,6 +162,17 @@ config correlation 'correlation'
option auto_ban '0'
option auto_ban_threshold '80'
option notifications '1'
+
+# LAN Passive Flow Analysis (no MITM, no cache)
+config lan 'lan'
+ option enabled '1'
+ option interface 'br-lan'
+ option realtime '1'
+ option track_clients '1'
+ option track_destinations '1'
+ option track_protocols '1'
+ option aggregate_interval '5'
+ option client_retention '3600'
```
## LuCI Dashboard
@@ -146,6 +181,7 @@ Navigate to **SecuBox → DPI Dual-Stream**:
- **Overview**: Stream status, metrics, threats table
- **Correlation Timeline**: Event cards with IP context
+- **LAN Flows**: Real-time LAN client monitoring (clients, protocols, destinations)
- **Settings**: Full configuration interface
## Files
@@ -155,6 +191,7 @@ Navigate to **SecuBox → DPI Dual-Stream**:
| `/usr/sbin/dpi-dualctl` | Main CLI tool |
| `/usr/sbin/dpi-flow-collector` | Flow aggregation service |
| `/usr/sbin/dpi-correlator` | Correlation engine |
+| `/usr/sbin/dpi-lan-collector` | LAN passive flow collector |
| `/usr/lib/dpi-dual/mirror-setup.sh` | tc mirred port mirroring |
| `/usr/lib/dpi-dual/correlation-lib.sh` | Shared correlation functions |
| `/srv/mitmproxy/addons/dpi_buffer.py` | mitmproxy double buffer addon |
@@ -171,6 +208,10 @@ Navigate to **SecuBox → DPI Dual-Stream**:
| `/tmp/secubox/correlated-threats.json` | Correlated threat log (JSONL) |
| `/tmp/secubox/ip-reputation.json` | IP reputation database |
| `/tmp/secubox/notifications.json` | High-severity threat notifications |
+| `/tmp/secubox/lan-flows.json` | LAN flow summary stats |
+| `/tmp/secubox/lan-clients.json` | Active LAN clients data |
+| `/tmp/secubox/lan-destinations.json` | External destinations accessed |
+| `/tmp/secubox/lan-protocols.json` | Detected protocols/apps |
## Dependencies
@@ -181,12 +222,13 @@ Navigate to **SecuBox → DPI Dual-Stream**:
## Performance
-| Aspect | MITM Stream | TAP Stream |
-|--------|-------------|------------|
-| Latency | +5-20ms | 0ms |
-| CPU | High (SSL, WAF) | Low (nDPI) |
-| Memory | Buffer dependent | Minimal |
-| Visibility | Full content | Metadata only |
+| Aspect | MITM Stream | TAP Stream | LAN Passive |
+|--------|-------------|------------|-------------|
+| Latency | +5-20ms | 0ms | 0ms |
+| CPU | High (SSL, WAF) | Low (nDPI) | Low (nDPI) |
+| Memory | Buffer dependent | Minimal | Minimal |
+| Visibility | Full content | Metadata only | Metadata only |
+| Use Case | WAF/Threat detection | WAN analysis | LAN monitoring |
## Security Notes
diff --git a/package/secubox/secubox-dpi-dual/files/etc/config/dpi-dual b/package/secubox/secubox-dpi-dual/files/etc/config/dpi-dual
index dd33f5b6..1f35ed16 100644
--- a/package/secubox/secubox-dpi-dual/files/etc/config/dpi-dual
+++ b/package/secubox/secubox-dpi-dual/files/etc/config/dpi-dual
@@ -29,3 +29,16 @@ config correlation 'correlation'
option auto_ban_threshold '80'
option notifications '1'
option reputation_decay '5'
+
+# LAN TAP - Real-time passive flow analysis
+# No MITM, no caching - just nDPI flow monitoring
+config lan 'lan'
+ option enabled '1'
+ option interface 'br-lan'
+ option realtime '1'
+ option track_clients '1'
+ option track_destinations '1'
+ option track_protocols '1'
+ option aggregate_interval '5'
+ option client_retention '3600'
+ option netifyd_instance 'lan'
diff --git a/package/secubox/secubox-dpi-dual/files/etc/init.d/dpi-dual b/package/secubox/secubox-dpi-dual/files/etc/init.d/dpi-dual
index 5557dae1..ac8394f5 100644
--- a/package/secubox/secubox-dpi-dual/files/etc/init.d/dpi-dual
+++ b/package/secubox/secubox-dpi-dual/files/etc/init.d/dpi-dual
@@ -53,6 +53,18 @@ start_service() {
;;
esac
+ # Start LAN passive collector if enabled
+ local lan_enabled
+ config_get lan_enabled lan enabled "0"
+ if [ "$lan_enabled" = "1" ]; then
+ procd_open_instance lan-collector
+ procd_set_param command /usr/sbin/dpi-lan-collector start
+ procd_set_param respawn
+ procd_set_param stdout 1
+ procd_set_param stderr 1
+ procd_close_instance
+ fi
+
# Start correlator if enabled
local correlation
config_get correlation settings correlation "1"
diff --git a/package/secubox/secubox-dpi-dual/files/usr/sbin/dpi-dualctl b/package/secubox/secubox-dpi-dual/files/usr/sbin/dpi-dualctl
index b6531668..21061168 100644
--- a/package/secubox/secubox-dpi-dual/files/usr/sbin/dpi-dualctl
+++ b/package/secubox/secubox-dpi-dual/files/usr/sbin/dpi-dualctl
@@ -43,6 +43,15 @@ cmd_start() {
;;
esac
+ # Start LAN passive collector if enabled
+ local lan_enabled
+ config_get lan_enabled lan enabled "0"
+ if [ "$lan_enabled" = "1" ]; then
+ echo "Starting LAN passive flow collector..."
+ start-stop-daemon -S -b -x /usr/sbin/dpi-lan-collector -- start
+ echo "LAN collector started"
+ fi
+
# Start correlator if enabled
local correlation
config_get correlation settings correlation "1"
@@ -64,6 +73,9 @@ cmd_stop() {
# Stop flow collector
killall dpi-flow-collector 2>/dev/null
+ # Stop LAN collector
+ killall dpi-lan-collector 2>/dev/null
+
# Stop mirror
/usr/lib/dpi-dual/mirror-setup.sh stop
@@ -129,6 +141,36 @@ cmd_status() {
fi
echo ""
+ echo "=== LAN Passive Flow Analysis ==="
+ local lan_enabled
+ config_get lan_enabled lan enabled "0"
+
+ if [ "$lan_enabled" = "1" ]; then
+ local lan_if
+ config_get lan_if lan interface "br-lan"
+ echo "Interface: $lan_if"
+
+ if pgrep dpi-lan-collector >/dev/null 2>&1; then
+ echo "Collector: RUNNING"
+ else
+ echo "Collector: STOPPED"
+ fi
+
+ local lan_file="$STATS_DIR/lan-flows.json"
+ if [ -f "$lan_file" ]; then
+ local clients dests protos
+ clients=$(jsonfilter -i "$lan_file" -e '@.active_clients' 2>/dev/null || echo 0)
+ dests=$(jsonfilter -i "$lan_file" -e '@.unique_destinations' 2>/dev/null || echo 0)
+ protos=$(jsonfilter -i "$lan_file" -e '@.detected_protocols' 2>/dev/null || echo 0)
+ echo "Active clients: $clients"
+ echo "Unique destinations: $dests"
+ echo "Detected protocols: $protos"
+ fi
+ else
+ echo "Status: DISABLED"
+ fi
+ echo ""
+
echo "=== Correlation Engine ==="
if pgrep dpi-correlator >/dev/null 2>&1; then
echo "Status: RUNNING"
@@ -174,6 +216,50 @@ cmd_mirror() {
/usr/lib/dpi-dual/mirror-setup.sh "$@"
}
+cmd_clients() {
+ load_config
+ local clients_file="$STATS_DIR/lan-clients.json"
+
+ if [ -f "$clients_file" ]; then
+ cat "$clients_file"
+ else
+ echo '{"clients":[],"error":"LAN collector not running or no data"}'
+ fi
+}
+
+cmd_destinations() {
+ load_config
+ local dests_file="$STATS_DIR/lan-destinations.json"
+
+ if [ -f "$dests_file" ]; then
+ cat "$dests_file"
+ else
+ echo '{"destinations":[],"error":"LAN collector not running or no data"}'
+ fi
+}
+
+cmd_protocols() {
+ load_config
+ local protos_file="$STATS_DIR/lan-protocols.json"
+
+ if [ -f "$protos_file" ]; then
+ cat "$protos_file"
+ else
+ echo '{"protocols":[],"error":"LAN collector not running or no data"}'
+ fi
+}
+
+cmd_lan() {
+ load_config
+ local lan_file="$STATS_DIR/lan-flows.json"
+
+ if [ -f "$lan_file" ]; then
+ cat "$lan_file"
+ else
+ echo '{"error":"LAN collector not running"}'
+ fi
+}
+
cmd_help() {
cat << EOF
DPI Dual-Stream Control
@@ -188,6 +274,13 @@ Commands:
flows Show current flow statistics (JSON)
threats [N] Show last N correlated threats (default: 20)
mirror Control mirror setup (start|stop|status)
+
+LAN Passive Analysis:
+ lan Show LAN flow summary (JSON)
+ clients Show active LAN clients and their traffic (JSON)
+ destinations Show external destinations accessed (JSON)
+ protocols Show detected protocols/applications (JSON)
+
help Show this help
Configuration: /etc/config/dpi-dual
@@ -197,6 +290,10 @@ Modes:
mitm-only - Only MITM stream (HAProxy + mitmproxy)
tap-only - Only passive TAP stream (netifyd)
+LAN Analysis:
+ Enable 'lan' section for real-time passive flow monitoring
+ on br-lan interface (no MITM, no caching - pure nDPI).
+
EOF
}
@@ -225,6 +322,18 @@ case "$1" in
shift
cmd_mirror "$@"
;;
+ lan)
+ cmd_lan
+ ;;
+ clients)
+ cmd_clients
+ ;;
+ destinations)
+ cmd_destinations
+ ;;
+ protocols)
+ cmd_protocols
+ ;;
help|--help|-h)
cmd_help
;;
diff --git a/package/secubox/secubox-dpi-dual/files/usr/sbin/dpi-lan-collector b/package/secubox/secubox-dpi-dual/files/usr/sbin/dpi-lan-collector
new file mode 100644
index 00000000..550b6e2b
--- /dev/null
+++ b/package/secubox/secubox-dpi-dual/files/usr/sbin/dpi-lan-collector
@@ -0,0 +1,366 @@
+#!/bin/sh
+# DPI LAN Flow Collector - Real-time passive flow analysis
+# No MITM, no caching - pure nDPI flow monitoring on br-lan
+# Part of secubox-dpi-dual package
+
+. /lib/functions.sh
+
+config_load dpi-dual
+
+STATS_DIR=""
+LAN_IF=""
+AGGREGATE_INTERVAL=""
+CLIENT_RETENTION=""
+NETIFYD_INSTANCE=""
+
+# Real-time data files
+CLIENTS_FILE=""
+FLOWS_FILE=""
+PROTOCOLS_FILE=""
+DESTINATIONS_FILE=""
+
+load_config() {
+ config_get STATS_DIR settings stats_dir "/tmp/secubox"
+ config_get LAN_IF lan interface "br-lan"
+ config_get AGGREGATE_INTERVAL lan aggregate_interval "5"
+ config_get CLIENT_RETENTION lan client_retention "3600"
+ config_get NETIFYD_INSTANCE lan netifyd_instance "lan"
+
+ CLIENTS_FILE="$STATS_DIR/lan-clients.json"
+ FLOWS_FILE="$STATS_DIR/lan-flows.json"
+ PROTOCOLS_FILE="$STATS_DIR/lan-protocols.json"
+ DESTINATIONS_FILE="$STATS_DIR/lan-destinations.json"
+}
+
+init_dirs() {
+ mkdir -p "$STATS_DIR"
+}
+
+# Parse netifyd JSON flow events in real-time
+parse_flow_event() {
+ local line="$1"
+
+ # Extract flow data using jsonfilter
+ local flow_type=$(echo "$line" | jsonfilter -e '@.type' 2>/dev/null)
+ [ "$flow_type" != "flow" ] && return
+
+ local local_ip=$(echo "$line" | jsonfilter -e '@.flow.local_ip' 2>/dev/null)
+ local other_ip=$(echo "$line" | jsonfilter -e '@.flow.other_ip' 2>/dev/null)
+ local proto=$(echo "$line" | jsonfilter -e '@.flow.detected_protocol_name' 2>/dev/null)
+ local app=$(echo "$line" | jsonfilter -e '@.flow.detected_application_name' 2>/dev/null)
+ local bytes_in=$(echo "$line" | jsonfilter -e '@.flow.local_bytes' 2>/dev/null || echo 0)
+ local bytes_out=$(echo "$line" | jsonfilter -e '@.flow.other_bytes' 2>/dev/null || echo 0)
+ local local_port=$(echo "$line" | jsonfilter -e '@.flow.local_port' 2>/dev/null || echo 0)
+ local other_port=$(echo "$line" | jsonfilter -e '@.flow.other_port' 2>/dev/null || echo 0)
+
+ [ -z "$local_ip" ] && return
+
+ # Determine direction (LAN client -> external)
+ local client_ip=""
+ local dest_ip=""
+ local dest_port=""
+
+ # Check if local_ip is in LAN range (192.168.x.x, 10.x.x.x, 172.16-31.x.x)
+ case "$local_ip" in
+ 192.168.*|10.*|172.1[6-9].*|172.2[0-9].*|172.3[0-1].*)
+ client_ip="$local_ip"
+ dest_ip="$other_ip"
+ dest_port="$other_port"
+ ;;
+ *)
+ # other_ip is the LAN client
+ client_ip="$other_ip"
+ dest_ip="$local_ip"
+ dest_port="$local_port"
+ ;;
+ esac
+
+ [ -z "$client_ip" ] && return
+
+ # Update real-time tracking files
+ update_client_stats "$client_ip" "$bytes_in" "$bytes_out" "$proto" "$app"
+ update_destination_stats "$dest_ip" "$dest_port" "$proto" "$bytes_in" "$bytes_out"
+ update_protocol_stats "$proto" "$app" "$bytes_in" "$bytes_out"
+}
+
+# Update client statistics
+update_client_stats() {
+ local client_ip="$1"
+ local bytes_in="$2"
+ local bytes_out="$3"
+ local proto="$4"
+ local app="$5"
+
+ local timestamp=$(date +%s)
+ local client_file="$STATS_DIR/client_${client_ip}.tmp"
+
+ # Read existing stats
+ local existing_bytes_in=0
+ local existing_bytes_out=0
+ local existing_flows=0
+ local first_seen=$timestamp
+
+ if [ -f "$client_file" ]; then
+ existing_bytes_in=$(jsonfilter -i "$client_file" -e '@.bytes_in' 2>/dev/null || echo 0)
+ existing_bytes_out=$(jsonfilter -i "$client_file" -e '@.bytes_out' 2>/dev/null || echo 0)
+ existing_flows=$(jsonfilter -i "$client_file" -e '@.flows' 2>/dev/null || echo 0)
+ first_seen=$(jsonfilter -i "$client_file" -e '@.first_seen' 2>/dev/null || echo $timestamp)
+ fi
+
+ # Accumulate
+ bytes_in=$((existing_bytes_in + bytes_in))
+ bytes_out=$((existing_bytes_out + bytes_out))
+ existing_flows=$((existing_flows + 1))
+
+ # Write updated stats
+ cat > "$client_file" << EOF
+{"ip":"$client_ip","bytes_in":$bytes_in,"bytes_out":$bytes_out,"flows":$existing_flows,"last_proto":"$proto","last_app":"$app","first_seen":$first_seen,"last_seen":$timestamp}
+EOF
+}
+
+# Update destination statistics
+update_destination_stats() {
+ local dest_ip="$1"
+ local dest_port="$2"
+ local proto="$3"
+ local bytes_in="$4"
+ local bytes_out="$5"
+
+ # Skip internal destinations
+ case "$dest_ip" in
+ 192.168.*|10.*|172.1[6-9].*|172.2[0-9].*|172.3[0-1].*|127.*)
+ return
+ ;;
+ esac
+
+ local timestamp=$(date +%s)
+ local dest_key=$(echo "${dest_ip}_${dest_port}" | tr '.:' '__')
+ local dest_file="$STATS_DIR/dest_${dest_key}.tmp"
+
+ local existing_bytes=0
+ local existing_hits=0
+
+ if [ -f "$dest_file" ]; then
+ existing_bytes=$(jsonfilter -i "$dest_file" -e '@.bytes' 2>/dev/null || echo 0)
+ existing_hits=$(jsonfilter -i "$dest_file" -e '@.hits' 2>/dev/null || echo 0)
+ fi
+
+ bytes_total=$((bytes_in + bytes_out + existing_bytes))
+ existing_hits=$((existing_hits + 1))
+
+ cat > "$dest_file" << EOF
+{"ip":"$dest_ip","port":$dest_port,"proto":"$proto","bytes":$bytes_total,"hits":$existing_hits,"last_seen":$timestamp}
+EOF
+}
+
+# Update protocol statistics
+update_protocol_stats() {
+ local proto="$1"
+ local app="$2"
+ local bytes_in="$3"
+ local bytes_out="$4"
+
+ [ -z "$proto" ] && proto="Unknown"
+ [ -z "$app" ] && app="Unknown"
+
+ local proto_key=$(echo "${proto}_${app}" | tr ' /:' '___')
+ local proto_file="$STATS_DIR/proto_${proto_key}.tmp"
+
+ local existing_bytes=0
+ local existing_flows=0
+
+ if [ -f "$proto_file" ]; then
+ existing_bytes=$(jsonfilter -i "$proto_file" -e '@.bytes' 2>/dev/null || echo 0)
+ existing_flows=$(jsonfilter -i "$proto_file" -e '@.flows' 2>/dev/null || echo 0)
+ fi
+
+ bytes_total=$((bytes_in + bytes_out + existing_bytes))
+ existing_flows=$((existing_flows + 1))
+
+ cat > "$proto_file" << EOF
+{"protocol":"$proto","application":"$app","bytes":$bytes_total,"flows":$existing_flows}
+EOF
+}
+
+# Aggregate stats into summary JSON files
+aggregate_stats() {
+ local timestamp=$(date -Iseconds)
+ local cutoff=$(($(date +%s) - CLIENT_RETENTION))
+
+ # Aggregate clients
+ {
+ printf '{"timestamp":"%s","clients":[' "$timestamp"
+ local first=1
+ for f in "$STATS_DIR"/client_*.tmp 2>/dev/null; do
+ [ -f "$f" ] || continue
+ local last_seen=$(jsonfilter -i "$f" -e '@.last_seen' 2>/dev/null || echo 0)
+ # Skip expired entries
+ [ "$last_seen" -lt "$cutoff" ] && { rm -f "$f"; continue; }
+ [ $first -eq 0 ] && printf ','
+ cat "$f"
+ first=0
+ done
+ printf ']}'
+ } > "$CLIENTS_FILE"
+
+ # Aggregate destinations (top 100)
+ {
+ printf '{"timestamp":"%s","destinations":[' "$timestamp"
+ local first=1
+ for f in "$STATS_DIR"/dest_*.tmp 2>/dev/null; do
+ [ -f "$f" ] || continue
+ local last_seen=$(jsonfilter -i "$f" -e '@.last_seen' 2>/dev/null || echo 0)
+ [ "$last_seen" -lt "$cutoff" ] && { rm -f "$f"; continue; }
+ [ $first -eq 0 ] && printf ','
+ cat "$f"
+ first=0
+ done
+ printf ']}'
+ } > "$DESTINATIONS_FILE"
+
+ # Aggregate protocols
+ {
+ printf '{"timestamp":"%s","protocols":[' "$timestamp"
+ local first=1
+ for f in "$STATS_DIR"/proto_*.tmp 2>/dev/null; do
+ [ -f "$f" ] || continue
+ [ $first -eq 0 ] && printf ','
+ cat "$f"
+ first=0
+ done
+ printf ']}'
+ } > "$PROTOCOLS_FILE"
+
+ # Write summary flows file
+ local total_clients=$(ls -1 "$STATS_DIR"/client_*.tmp 2>/dev/null | wc -l)
+ local total_dests=$(ls -1 "$STATS_DIR"/dest_*.tmp 2>/dev/null | wc -l)
+ local total_protos=$(ls -1 "$STATS_DIR"/proto_*.tmp 2>/dev/null | wc -l)
+
+ # Get interface stats
+ local rx_bytes=0 tx_bytes=0 rx_packets=0 tx_packets=0
+ if [ -d "/sys/class/net/$LAN_IF/statistics" ]; then
+ rx_bytes=$(cat "/sys/class/net/$LAN_IF/statistics/rx_bytes" 2>/dev/null || echo 0)
+ tx_bytes=$(cat "/sys/class/net/$LAN_IF/statistics/tx_bytes" 2>/dev/null || echo 0)
+ rx_packets=$(cat "/sys/class/net/$LAN_IF/statistics/rx_packets" 2>/dev/null || echo 0)
+ tx_packets=$(cat "/sys/class/net/$LAN_IF/statistics/tx_packets" 2>/dev/null || echo 0)
+ fi
+
+ cat > "$FLOWS_FILE" << EOF
+{
+ "timestamp": "$timestamp",
+ "mode": "lan_passive",
+ "interface": "$LAN_IF",
+ "active_clients": $total_clients,
+ "unique_destinations": $total_dests,
+ "detected_protocols": $total_protos,
+ "rx_bytes": $rx_bytes,
+ "tx_bytes": $tx_bytes,
+ "rx_packets": $rx_packets,
+ "tx_packets": $tx_packets
+}
+EOF
+}
+
+# Watch netifyd JSON output in real-time
+watch_netifyd() {
+ local netifyd_socket="/var/run/netifyd/netifyd-${NETIFYD_INSTANCE}.sock"
+
+ # Fall back to default socket if instance-specific doesn't exist
+ [ ! -S "$netifyd_socket" ] && netifyd_socket="/var/run/netifyd/netifyd.sock"
+
+ if [ -S "$netifyd_socket" ]; then
+ echo "Connecting to netifyd socket: $netifyd_socket"
+ # Subscribe to flow events
+ echo '{"type":"subscribe","channel":"flow_update"}' | nc -U "$netifyd_socket" 2>/dev/null | while read -r line; do
+ parse_flow_event "$line"
+ done
+ else
+ echo "Netifyd socket not found, using /var/log/netifyd.log"
+ # Fallback: tail the netifyd log
+ tail -F /var/log/netifyd.log 2>/dev/null | while read -r line; do
+ # Extract JSON from log lines
+ case "$line" in
+ *'{"type":"flow'*)
+ json_part="${line#*\{}"
+ json_part="{$json_part"
+ parse_flow_event "$json_part"
+ ;;
+ esac
+ done
+ fi
+}
+
+# Background aggregation loop
+run_aggregator() {
+ while true; do
+ aggregate_stats
+ sleep "$AGGREGATE_INTERVAL"
+ done
+}
+
+run_collector() {
+ load_config
+ init_dirs
+
+ echo "DPI LAN Flow Collector started"
+ echo " Interface: $LAN_IF"
+ echo " Aggregate interval: ${AGGREGATE_INTERVAL}s"
+ echo " Client retention: ${CLIENT_RETENTION}s"
+ echo " Stats dir: $STATS_DIR"
+
+ # Initialize empty files
+ echo '{"timestamp":"","clients":[]}' > "$CLIENTS_FILE"
+ echo '{"timestamp":"","destinations":[]}' > "$DESTINATIONS_FILE"
+ echo '{"timestamp":"","protocols":[]}' > "$PROTOCOLS_FILE"
+
+ # Start background aggregator
+ run_aggregator &
+ AGGREGATOR_PID=$!
+
+ trap "kill $AGGREGATOR_PID 2>/dev/null; exit 0" INT TERM
+
+ # Watch netifyd in foreground
+ watch_netifyd
+}
+
+status() {
+ load_config
+
+ echo "=== LAN Flow Collector Status ==="
+ echo "Interface: $LAN_IF"
+
+ if [ -f "$FLOWS_FILE" ]; then
+ echo ""
+ echo "Current Stats:"
+ local active=$(jsonfilter -i "$FLOWS_FILE" -e '@.active_clients' 2>/dev/null || echo 0)
+ local dests=$(jsonfilter -i "$FLOWS_FILE" -e '@.unique_destinations' 2>/dev/null || echo 0)
+ local protos=$(jsonfilter -i "$FLOWS_FILE" -e '@.detected_protocols' 2>/dev/null || echo 0)
+ echo " Active clients: $active"
+ echo " Unique destinations: $dests"
+ echo " Detected protocols: $protos"
+ fi
+
+ if [ -f "$CLIENTS_FILE" ]; then
+ echo ""
+ echo "Top Clients (by flows):"
+ jsonfilter -i "$CLIENTS_FILE" -e '@.clients[*]' 2>/dev/null | head -5
+ fi
+}
+
+case "$1" in
+ start)
+ run_collector
+ ;;
+ status)
+ status
+ ;;
+ aggregate)
+ load_config
+ init_dirs
+ aggregate_stats
+ ;;
+ *)
+ echo "Usage: $0 {start|status|aggregate}"
+ exit 1
+ ;;
+esac