Configuring Mirror and Decrypt in Gateway mode

Example topology:

Item

Description

1

Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources., through which your networks send and receive their traffic.

2

Recorder, or Packet-Broker that works in a monitor (promiscuous) mode.

3

Flow of the decrypted and mirrored traffic from the Security Gateway (1) to the Recorder, or Packet-Broker (2).

eth4

Designated physical interface on the Security Gateway (1).