<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PaloAlto Decrypt Mirror not traffic visible to VM but switch port mirror traffic is in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-decrypt-mirror-not-traffic-visible-to-vm-but-switch/m-p/250776#M71311</link>
    <description>&lt;P class="s90z9tc-10 fHRkcP"&gt;I've setup VMware ESXi 6.5 and 6.5U1 with a few different intrusion detection systems and SIEM platforms and getting inconsistent behavior w/ the Palo Alto Decrypt Mirror port vs. other technologies such as a SPAN or "Mirror Port".&lt;/P&gt;&lt;P class="s90z9tc-10 fHRkcP"&gt;Many NIDS platforms (SecOnion, Bro, Moloch) can accept data from a SPAN, Mirror, or physical network tap and do intrusion detection / network extraction on the inbound data. Example - plug a USR 4503 TAP in between a perimeter firewall (inline), and then you can take the TAP port, plug it into a NIC on VMware ESX, configure the vSwitch and PortGroup to accept promiscuous mode, connect that to a virtual NIC, and the NIDS / SIEM can monitor the traffic. Key rule - you *must* enable promiscuous mode, and IRL, only connect this type of PortGroup/VSwitch to a "monitoring interface". So - be direct, restrictive, and "single purpose".&lt;/P&gt;&lt;P class="s90z9tc-10 fHRkcP"&gt;Enter the Palo Alto PA220. I have successfully configured decrypt port mirror, got the certificate in place on a Mac and an IPad, and seen in the Palo Alto (PANOS 8.1.4) that the traffic is decrypted. So that part of the equation works. When I plug in a Mac or a Windows PC to the physical cable attached to the PA's Decrypt Mirror port, I can see fully decrypted SSL/TLS type traffic - rather cool!&lt;/P&gt;&lt;P class="s90z9tc-10 fHRkcP"&gt;However, when I connect a vSwithch &amp;amp; Port group to a NIC plugged into the PA's Decrypt mirror port and then attach the PG to a Linux system, I cannot see the data with TCPdump.&lt;/P&gt;&lt;P class="s90z9tc-10 fHRkcP"&gt;So - test my setup then -&amp;gt; Just to make sure I had everything right - I configured a port mirror on a Cisco S300, and mirrored the traffic from the port w/ the firewall plugged in (Interior side), and sure enough - that data was delivered to the switch just fine, beause I can add a third NIC to my Linux system and can see the regular mirrored traffic just fine. (CLA: tcpdump -A -n -i eth2 "not dest net 10.0.0.0/16 and ip" shows me traffic to/from the Internet, encrypted for port 443, DNS data is visible)&lt;/P&gt;&lt;P class="s90z9tc-10 fHRkcP"&gt;SO -&amp;gt; net effect =&amp;gt; and the query to the Community:&lt;/P&gt;&lt;P class="s90z9tc-10 fHRkcP"&gt;What would cause a PA 220 w/ Decrypt Port Mirror not to present data to a client VM using VMware ESXk 6.5, when port mirrors from switches do present data to the VM and there is no other obvious differences in the configuration?&lt;/P&gt;&lt;P class="s90z9tc-10 fHRkcP"&gt;Thanks for any assistance you can give.&lt;/P&gt;</description>
    <pubDate>Thu, 21 Feb 2019 20:14:16 GMT</pubDate>
    <dc:creator>dmurdoch</dc:creator>
    <dc:date>2019-02-21T20:14:16Z</dc:date>
    <item>
      <title>PaloAlto Decrypt Mirror not traffic visible to VM but switch port mirror traffic is</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-decrypt-mirror-not-traffic-visible-to-vm-but-switch/m-p/250776#M71311</link>
      <description>&lt;P class="s90z9tc-10 fHRkcP"&gt;I've setup VMware ESXi 6.5 and 6.5U1 with a few different intrusion detection systems and SIEM platforms and getting inconsistent behavior w/ the Palo Alto Decrypt Mirror port vs. other technologies such as a SPAN or "Mirror Port".&lt;/P&gt;&lt;P class="s90z9tc-10 fHRkcP"&gt;Many NIDS platforms (SecOnion, Bro, Moloch) can accept data from a SPAN, Mirror, or physical network tap and do intrusion detection / network extraction on the inbound data. Example - plug a USR 4503 TAP in between a perimeter firewall (inline), and then you can take the TAP port, plug it into a NIC on VMware ESX, configure the vSwitch and PortGroup to accept promiscuous mode, connect that to a virtual NIC, and the NIDS / SIEM can monitor the traffic. Key rule - you *must* enable promiscuous mode, and IRL, only connect this type of PortGroup/VSwitch to a "monitoring interface". So - be direct, restrictive, and "single purpose".&lt;/P&gt;&lt;P class="s90z9tc-10 fHRkcP"&gt;Enter the Palo Alto PA220. I have successfully configured decrypt port mirror, got the certificate in place on a Mac and an IPad, and seen in the Palo Alto (PANOS 8.1.4) that the traffic is decrypted. So that part of the equation works. When I plug in a Mac or a Windows PC to the physical cable attached to the PA's Decrypt Mirror port, I can see fully decrypted SSL/TLS type traffic - rather cool!&lt;/P&gt;&lt;P class="s90z9tc-10 fHRkcP"&gt;However, when I connect a vSwithch &amp;amp; Port group to a NIC plugged into the PA's Decrypt mirror port and then attach the PG to a Linux system, I cannot see the data with TCPdump.&lt;/P&gt;&lt;P class="s90z9tc-10 fHRkcP"&gt;So - test my setup then -&amp;gt; Just to make sure I had everything right - I configured a port mirror on a Cisco S300, and mirrored the traffic from the port w/ the firewall plugged in (Interior side), and sure enough - that data was delivered to the switch just fine, beause I can add a third NIC to my Linux system and can see the regular mirrored traffic just fine. (CLA: tcpdump -A -n -i eth2 "not dest net 10.0.0.0/16 and ip" shows me traffic to/from the Internet, encrypted for port 443, DNS data is visible)&lt;/P&gt;&lt;P class="s90z9tc-10 fHRkcP"&gt;SO -&amp;gt; net effect =&amp;gt; and the query to the Community:&lt;/P&gt;&lt;P class="s90z9tc-10 fHRkcP"&gt;What would cause a PA 220 w/ Decrypt Port Mirror not to present data to a client VM using VMware ESXk 6.5, when port mirrors from switches do present data to the VM and there is no other obvious differences in the configuration?&lt;/P&gt;&lt;P class="s90z9tc-10 fHRkcP"&gt;Thanks for any assistance you can give.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Feb 2019 20:14:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-decrypt-mirror-not-traffic-visible-to-vm-but-switch/m-p/250776#M71311</guid>
      <dc:creator>dmurdoch</dc:creator>
      <dc:date>2019-02-21T20:14:16Z</dc:date>
    </item>
    <item>
      <title>Re: PaloAlto Decrypt Mirror not traffic visible to VM but switch port mirror traffic is</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-decrypt-mirror-not-traffic-visible-to-vm-but-switch/m-p/251664#M71560</link>
      <description>&lt;P&gt;The decrypt mirror only outputs what is inside the encapsulated payload of the decrypted traffic while a SPAN port forwards everything.&lt;/P&gt;
&lt;P&gt;This means there's no MAC addresses being exchanged and no handshakes etc., which may trip up the vSwitch&lt;/P&gt;</description>
      <pubDate>Thu, 28 Feb 2019 09:14:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-decrypt-mirror-not-traffic-visible-to-vm-but-switch/m-p/251664#M71560</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-02-28T09:14:28Z</dc:date>
    </item>
    <item>
      <title>Re: PaloAlto Decrypt Mirror not traffic visible to VM but switch port mirror traffic is</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-decrypt-mirror-not-traffic-visible-to-vm-but-switch/m-p/251899#M71623</link>
      <description>&lt;P&gt;The plot thickens on this topic. &amp;nbsp;First, I was capable of plugging in the decrypt mirror port into a commodity switch, and the &amp;nbsp;port mirror the switchport &amp;nbsp;into my esx system and it worked. Meaning the inexpensive switch got the data to a system running as an &amp;nbsp;ESX vm. Second, I have a friend with a VM100, and two ESXi systems, He configured his decrypt port mirror to use a lan port, then cabled that lan port to another ESX system, and the Sec Onion running on the second ESX system received the data.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Mar 2019 11:48:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-decrypt-mirror-not-traffic-visible-to-vm-but-switch/m-p/251899#M71623</guid>
      <dc:creator>dmurdoch</dc:creator>
      <dc:date>2019-03-01T11:48:10Z</dc:date>
    </item>
  </channel>
</rss>

