Print Download PDF Send Feedback

Previous

Next

Mirror and Decrypt

In This Section:

Introduction to Mirror and Decrypt

Mirror and Decrypt Requirements

Configuring Mirror and Decrypt in Gateway mode

Configuring Mirror and Decrypt in VSX mode

Mirror and Decrypt Logs

Introduction to Mirror and Decrypt

The Mirror and Decrypt feature performs these actions on your Security Gateway, or Cluster:

Action

Description

Mirror only
of all traffic

Your Security Gateway or Cluster clones all traffic (including HTTPS without decryption) that passes through it, and sends it out of the designated physical interface.

Mirror and Decrypt
of HTTPS traffic

Your Security Gateway or Cluster clones all HTTPS traffic that passes through it, decrypts it, and sends it in clear-text out of the designated physical interface.

Note - If you wish to decrypt the HTTPS traffic, you must enable and configure the HTTPS Inspection on your Security Gateway, or Cluster.

You can add a third-party Recorder or Packet-Broker in your environment and forward to it the traffic that passes through your Security Gateway, or Cluster. This Recorder or Packet-Broker must work in monitor (promiscuous) mode to accept the decrypted and mirrored traffic from your Security Gateway, or Cluster.

R80.30 Security Gateway, or Cluster works only with one Recorder, which is directly connected to a designated physical network interface (NIC) on the Check Point Gateway, or Cluster Members.

Example Topology and Traffic Flow:

Item

Description

1

First network that sends and receives traffic through the Security Gateway (2).

2

Security Gateway, through which networks (1) and (3) send and receive their traffic.

3

Second network that sends and receives traffic through the Security Gateway (2).

4

Designated physical interface on the Security Gateway (2).

5

Recorder, or Packet-Broker that works in a monitor (promiscuous) mode.

A

Traffic flow between the first network (1) and the Security Gateway (2).

B

Traffic flow between the second network (3) and the Security Gateway (2).

C

Flow of the decrypted and mirrored traffic from the Security Gateway (2) to the Recorder, or Packet-Broker (5).

Workflow for configuring Mirror and Decrypt in Gateway mode:‎

Step

Description

1

Read and follow the Mirror and Decrypt Requirements.

2

Prepare the Security Gateway, or each cluster member.

3

Configure the Mirror and Decrypt in the Security Gateway, or Cluster object in SmartConsole.

Workflow for configuring Mirror and Decrypt in VSX mode:

Step

Description

1

Read and follow the Mirror and Decrypt Requirements.

2

Prepare the VSX Gateway, or each VSX cluster member.

3

Configure the Mirror and Decrypt in the Virtual System object in SmartConsole:

Source MAC address of the decrypted and mirrored packets

Traffic

Source MAC address of the decrypted and mirrored packets the Security Gateway and Cluster Members send

Mirror only of all traffic

MAC address of the designated physical interface.

Mirror and Decrypt of HTTPS traffic

00:00:00:00:00:00: