PaloAlto Decrypt Mirror not traffic visible to VM but switch port mirror traffic is

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

PaloAlto Decrypt Mirror not traffic visible to VM but switch port mirror traffic is

L0 Member

I've setup VMware ESXi 6.5 and 6.5U1 with a few different intrusion detection systems and SIEM platforms and getting inconsistent behavior w/ the Palo Alto Decrypt Mirror port vs. other technologies such as a SPAN or "Mirror Port".

Many NIDS platforms (SecOnion, Bro, Moloch) can accept data from a SPAN, Mirror, or physical network tap and do intrusion detection / network extraction on the inbound data. Example - plug a USR 4503 TAP in between a perimeter firewall (inline), and then you can take the TAP port, plug it into a NIC on VMware ESX, configure the vSwitch and PortGroup to accept promiscuous mode, connect that to a virtual NIC, and the NIDS / SIEM can monitor the traffic. Key rule - you *must* enable promiscuous mode, and IRL, only connect this type of PortGroup/VSwitch to a "monitoring interface". So - be direct, restrictive, and "single purpose".

Enter the Palo Alto PA220. I have successfully configured decrypt port mirror, got the certificate in place on a Mac and an IPad, and seen in the Palo Alto (PANOS 8.1.4) that the traffic is decrypted. So that part of the equation works. When I plug in a Mac or a Windows PC to the physical cable attached to the PA's Decrypt Mirror port, I can see fully decrypted SSL/TLS type traffic - rather cool!

However, when I connect a vSwithch & Port group to a NIC plugged into the PA's Decrypt mirror port and then attach the PG to a Linux system, I cannot see the data with TCPdump.

So - test my setup then -> Just to make sure I had everything right - I configured a port mirror on a Cisco S300, and mirrored the traffic from the port w/ the firewall plugged in (Interior side), and sure enough - that data was delivered to the switch just fine, beause I can add a third NIC to my Linux system and can see the regular mirrored traffic just fine. (CLA: tcpdump -A -n -i eth2 "not dest net 10.0.0.0/16 and ip" shows me traffic to/from the Internet, encrypted for port 443, DNS data is visible)

SO -> net effect => and the query to the Community:

What would cause a PA 220 w/ Decrypt Port Mirror not to present data to a client VM using VMware ESXk 6.5, when port mirrors from switches do present data to the VM and there is no other obvious differences in the configuration?

Thanks for any assistance you can give.

2 REPLIES 2

Cyber Elite
Cyber Elite

The decrypt mirror only outputs what is inside the encapsulated payload of the decrypted traffic while a SPAN port forwards everything.

This means there's no MAC addresses being exchanged and no handshakes etc., which may trip up the vSwitch

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization

The plot thickens on this topic.  First, I was capable of plugging in the decrypt mirror port into a commodity switch, and the  port mirror the switchport  into my esx system and it worked. Meaning the inexpensive switch got the data to a system running as an  ESX vm. Second, I have a friend with a VM100, and two ESXi systems, He configured his decrypt port mirror to use a lan port, then cabled that lan port to another ESX system, and the Sec Onion running on the second ESX system received the data. 

 

 

  • 2680 Views
  • 2 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!