BluSapphire
  • 01_Introduction
  • 02_Unified Cyber Defense Platform
  • 03_The Stack
  • 04_Features and capabilities
  • 05_Operations
  • 06_Architecture
    • Architecture - Version 3
    • Architecture - Version 4
  • 07_Integration
    • Cisco pxGrid Integration
    • Threat Intel Sources
  • 08_Use cases
    • SIGMA Rules
      • SIGMA Detection Attributes
      • Understanding SIGMA Rule
      • Creating SIGMA Rule
  • 09_CaseHub
    • Events
    • Cases
      • Case-Templates
    • Event-Rules
    • Reflex Query Language (RQL)
    • Input Configuration
      • Credentials
      • Agents
      • Field Templates
  • 10_Active-Defense-Services
    • Services (ADS - LIADS)
      • Network Services
      • Database Services
      • Web-Apps
    • Tokens (ADS - Tokens)
  • 11_Data-Pipeline-Manager (DPM)
    • Basic Concepts
    • Getting Started
  • 12_Deployment / Log Forwarding
    • Log Forwarding (on-prem) - How To
      • Fortimanager
      • Fortinet
      • Cisco ASA with FirePOWER services
      • Cisco ASA
      • Cisco VPN 3000 Concentrator
      • Cisco IOS Switch
      • Cisco ASA using ASDM
      • Cisco Router
      • Cisco Sourcefire
      • Cisco Ironport
      • Cisco Nexus Switch
      • Cisco VPN Concentrator
      • NetScreen Firewall
        • Configure/Enable Syslog Messages for Netscreen Firewall device using CLI Console:
      • Palo Alto Firewalls
        • Configure Syslog Monitoring
        • Configure a Syslog server profile
        • Create a log forwarding profile
        • Configure security policy rule action as log forwarding
        • Configure syslog forwarding for System, Config, HIP Match, and Correlation logs
      • Juniper
        • Using J-Web
        • Using CLI
        • Using J-Web
        • Using CLI
        • Configuring to send Syslog Messages directly from Sensor
      • Sonicwall
        • Configuring SonicWALL To Direct Log Streams
        • Configuring SonicWALL Logging Level
      • Checkpoint
        • R80.20
        • R80.10
        • R77.30
      • Blue Coat Proxy Logs
        • To Forward Blue Coat Logs Using Web Interface
        • To Forward Blue Coat Proxy Logs Using CLI
      • Tipping Point
      • FireEye
        • To Forward Fireeye NX Alert Logs
      • UBUNTU
      • CENTOS-RHEL
      • Citrix Access Gateway
      • SYMANTEC AV
      • DarkTrace
      • Nutanix
      • SAP
      • Cisco Meraki Firewall
      • Zoho Vault Integration
      • Zoho Analytics Integration
      • Sophos EDR Integration
      • PowerDMARC Integration
      • Perception Point Integration
      • MS Intune Integration
      • AWS-Cloudtrail & AWS-Cloudwatch integration
      • Dell PowerEdge Log Integration
      • HPE ProLiant DX380 Gen10 Log Integration
      • Lenovo ThinkSystem SR650 Log Integration
      • Aruba-3810M-L3 Switch
      • Cisco HX220C-M5SX Log Integration
      • Aruba-6200F-48-Access Switch
      • Brocade & Ruckus Switch Log Integration
      • Cavera L2 Switch Log Integration
      • CentOS & RHEL Log Integration
      • Cisco L2 Switch Log Integration
      • Cisco L3 Switch Log Integration
      • Dell EMC Switch Log Integration
      • Dell Powervault ME4 & ME5 Series Log Integration
      • HCI_CISCO_HX 240C_M5SX_CIMS(Intersight)
      • IBM AIX Log Integration
      • IBM Storwize Log Integration
      • Lenovo L2 Switch Log Integration
      • Lenovo Think System Storage Log Integration
      • lenovo_think_system_manager_851
      • Netgear M4300 Switch Log Integration
      • Net Gear Ready NAS 314 & Net Gear Ready NAS 428
      • qnap storage log integration
      • Ruckus SmartZone 100 Wi-Fi Controller Log Integration
      • Seqrite Endpoint Security 7.6 Log Integration
      • Suse log integration
      • Ubuntu log integration
      • Vcenter log integration
      • Microsoft SQL DB integration
      • Vios log integration
      • Cisco SF/SG 200 & 300 Series Switches
      • oracle db integration
      • lenovo thinksystem storage
      • F5 BIG-IP Load Balancer (11.x - 17.x)
      • Seqrite 76
      • Seqrite 82
      • Aruba switch log integration
      • Windows FIM
        • FIM Integration with GPO
        • FIM Integration without GPO
      • Sophos Firewall
        • Sophos XG Firewalls Syslog
          • Netflow Configuration To Verify
      • SAP
      • Integrating Forcepoint Web Proxy (or) Email Security
      • MicroAgent - Winlogbeat & Sysmon
        • Deploy Micro-Agent/Sysmon via GPO
        • MicroAgent manual installation
      • Microsoft’s IIS Integration
      • vios log integration
      • aruba switch log integration
      • oracle db integration
      • Cisco SF/SG 200 & 300 Series Switches
      • microsoft sql db integration
      • seqrite 82
      • seqrite 76
      • List of Supported Log Sources
        • 17.x)
    • Cloud Log Forwarding
      • Azure Sentinel
      • AWS Cloud Logs
        • Collecting CloudWatch Logs
        • Collecting Cloudtrail Logs
      • Configuring Mimecast for Log Collection via API
      • Cisco Umbrella
      • Cisco Duo
      • Cisco AMP
      • Cisco CES
      • SOPHOS AV
      • CROWDSTRIKE
      • Microsoft Defender ATP
        • Enable SIEM integration in Microsoft Defender ATP
        • Assign permissions to the WindowsDefenderATPSiemConnector application
    • BluArmour Pre-Deployment Checklist & Roll out Process
    • Deploy BluArmour via SCCM
    • BluGenie GPO for Service Account, WinRM and WMI
    • Mirror / SPAN port configuration
    • Average LogSize by LogSource
    • Windows Package Installation
    • Linux Package Installation
  • 13_MITRE ATT&CK
    • MITRE ATT&CK Coverage by Tactic
    • MITRE ATT&CK Coverage by Technique
    • Rules mapping - MITRE ATT&CK
  • 14_BluArmour Endpoint Protection
    • BluArmour For ICS / AirGapped Networks
  • 15_BluGenie
    • Manual
    • How To Guides
      • BluGenie Intro
      • How To Run
      • How to Use Help
      • Running Localhost & Remote commands
      • Get-BluGenieChildItemList
      • Invoke-BluGenieYara
    • Enable-BluGenieWinRMoverWMI
  • 16_Best Practices
    • Windows Logging Recommendations
      • Windows Security Log recommendations
      • Windows General Log Recommendations
      • Windows Advanced Auditing Recommendations
    • Lateral Movement Logging Recommendations
    • Best Data Sources for Detection
    • Cloud Incident Readiness
  • 17_Threat Hunt
  • 18_Taxonomy
    • Categories
    • Web Security Gateway
    • Cloud AWS
    • Windows
    • Linux
    • Endpoint Detection
    • NGFW (Firewalls)
    • Email Gateway Security
    • Network Access Control
    • Auth (IDAM)
    • Alert Data
    • Web Security Gateway
    • Endpoint Protection
    • DHCP
    • Cloud AWS
    • Wireless Access Controllers
    • Windows
    • Load Balancers (LB)
    • Linux
    • Active Defence (Deception)
  • 19_Product Videos
  • 20_M-SOC_Self Service Portal
    • Registering as a Customer (Regulated Entity)
    • Digital Contract Signing Process
      • RACI Matrix
    • Updating Billing Information
    • Updating Escalation Matrix
    • Manage Users and Roles
    • Windows Package Installation
    • Linux Package Installation
    • RPM Package Installation
    • Frequently Asked Questions (FAQ)
    • Default Log Collection
    • Incident Management Workflow(M-SOC only)
    • Troubleshooting Installs
    • MACOS Package Installation
  • Customer Self Service Portal
    • Registering as a Customer
    • Registering as a Partner
    • Digital Contract Signing Process
    • Updating Billing Information
    • Updating Escalation Matrix
    • Manage Users and Roles
    • Windows Package Installation
    • Linux deb Package Installation
    • Linux rpm Package Installation
    • Frequently Asked Questions (FAQ)
    • Default Log Collection
    • Troubleshooting Installs
  • Appendix A
  • 21_Incident Response
    • Cloud Incident Readiness
Powered by GitBook
On this page
  • SPAN/Port Mirroring Configuration
  • Configure Windows Server 2012 R2 or Windows Server 2016 Hyper-V Virtual Machines for Port Mirroring
  • Configure the Virtual Machine to Capture Mirrored Traffic
  • Configure the Mirror Port
  • Additional Configurations for Port Mirroring Setup from VLAN Traffic
  • Configuring VMware ESX Virtual Switches for Port Monitoring
  • Configuring the Check Point Gateway for Port Mirroring
  • Connecting the Device
  • Verifying the Configuration
  • Configuring the Cisco ASA 5505 for Port Mirroring
  • Configuring the Cisco Nexus 5000 Series for Port Mirroring
  • Configuring the Cisco SGxxx Series for Port Mirroring
  • Configuring the Dell Networking Force10 Switch for Port Mirroring
  • Configuring Dell SonicWALL Port Mirroring
  • Configuring the Fortinet FortiGate Switch for Port Mirroring
  • Configuration Through the CLI
  • Configuration Through the Web UI
  • Configuring SPAN on AWS VPCs
  1. 12_Deployment / Log Forwarding

Mirror / SPAN port configuration

PreviousBluGenie GPO for Service Account, WinRM and WMINextAverage LogSize by LogSource

Last updated 7 months ago

SPAN/Port Mirroring Configuration

With a deployed BluSapphire Sensor, you can monitor the network traffic using port mirroring. This allows BluSapphire to perform analysis on the network traffic, which aids in the detection of threats in your environment.

By configuring a mirror port on your virtual switch or physical network device, you can clone all traffic to a single port. After configuration, the switch sends a copy of all network packets seen on one port (or an entire VLAN) to another port. The BluSapphire Sensor immediately starts receiving events from the device through the port and begins its analysis.

Configure Windows Server 2012 R2 or Windows Server 2016 Hyper-V Virtual Machines for Port Mirroring

Complete the two following tasks to set up port mirroring on a Windows Server 2012 R2 or Windows Server 2016 Hyper-V host.

Important: Before you configure port mirroring on a Windows Server 2012 R2 VM, make sure that the Microsoft is applied.

Configure the Virtual Machine to Capture Mirrored Traffic

To configure the virtual machine you want to use to capture mirrored traffic

  1. Open the Microsoft Hyper-V Manager and right-click the machine that you want to use to capture mirrored traffic.

  2. Select Settings.

  3. Expand the associated network adapter and select Advanced Features.

  4. Scroll to the Port mirroring section and set the Mirroring mode to Destination.

  1. Click Apply and OK.

Configure the Mirror Port

To configure the mirror port

  1. Open the Windows PowerShell console.

  2. Enter the following:

$a = Get-VMSystemSwitchExtensionPortFeature -FeatureId 776e0ba7-94a1-41c8-8f28-951f524251b5

$a.SettingData.MonitorMode = 2

add-VMSwitchExtensionPortFeature -ExternalPort -SwitchName <virtual_switch_name> -VMSwitchExtensionFeature $a

Important: Be aware that, if you enable promiscuous mode for a physical port, it directs all the traffic received on that port towards the virtual machine destination.

Additional Configurations for Port Mirroring Setup from VLAN Traffic

If your environment uses a Virtual LAN to route traffic, you will also need to configure Hyper-V to accept packets from the designated VLAN ID range.

To set up VLAN port mirroring

  1. In Hyper-V Guest, create a Network Interface Controller (NIC) designated "management" with the following PowerShell command

Add-VMNetworkAdapter -VMName <VirtualMachineName> -Name "Management"

  1. Add the port you will use as a mirror

Add-VMNetworkAdapter -Vmname <VirtualMachineName> -name "Mirror"

If you have multiple NICs you are mirroring, repeate this step for each NIC.

  1. Add the VLAN ID ranges that will be mirrored

Set-VMNetworkAdapterVlan -VMName VIRTUALMACHINENAME -VMNetworkAdapterName "mirror" -trunk -allowedvlanidlist <VLAN-ID-Range> -nativevlanid <VLAN-ID-Range>

Important: The NIC needs to be created, named, and tagged with VLAN ID ranges as a guest in Hyper-V. If the NIC is not named and tagged properly, it can create errors in the guest system.

Configuring VMware ESX Virtual Switches for Port Monitoring

For BluSapphire Sensor to monitor traffic from your physical network, you need to allocate a spare NIC (Network Interface Card) on your VMware server to pass the SPAN port traffic to the virtual network. BluSapphire recommends that you SPAN your internal firewall ports, connect the SPAN port to the spare NIC, and then associate the spare NIC with a vSwitch.

Note: The following procedure is based on the ESXi 6.5 Web Client. If you are using a different client or an earlier version of VMware products, please consult the vendor documentation accordingly.

To monitor network traffic through a vSwitch

  1. Direct traffic from your physical network to the virtual network.

    1. Enable port mirroring on the network you want BluSapphire Sensor to monitor.

    2. Allocate a spare NIC on your VMware server to receive the mirrored traffic.

    3. Associate your spare NIC with the vSwitch.

  2. In the ESXi 6.5 Web Client, click Networking in the Navigator and select the Port groupstab.

Note: In VMware terminology, a port group acts like a network hub, making the network traffic undergoing the vSwitch visible to all interfaces connected to this port group.

  1. Click Add port group.

    1. Enter a name for the port group.

    2. In VLAN ID, select 4095 for the VGT (Virtual Guest Tagging) mode.

    1. In Virtual switch, select the vSwitch associated with the spare NIC configured in Step 1.

    2. Expand the Security section and set Promiscuous mode to Accept.

This setting assures any virtual interface connected to this port group will be able to enter promiscuous mode and capture traffic from any other virtual interfaces connected to the vSwitch.

  1. Click Add to create the port group.

  2. Next, you need to make sure that the BluSapphire Sensor is connected to one or more interfaces in the port group.

Repeat the steps for every vSwitch you want to monitor.

Configuring the Check Point Gateway for Port Mirroring

You can configure a mirror port for a Check Point deployment that includes a Security Management Server, a gateway, and a SmartDashboard. The mirror port duplicates the network traffic and records the activity in logs.

Use these procedures to configure a Check Point Gateway Switch for port mirroring.

Connecting the Device

To configure the device

  1. Open the VMware Security Gateway.

  2. From the command line, run

sysconfig

  1. Select Network Connections.

  2. Select Configure Connections.

  3. Select the interface to configure as the mirror port.

This is the one that you connected.

  1. Select Define as connected to a mirror port.

  2. Enable the Application Control blade in the SmartDashboard.

You can also enable the IPS blade to see IPS traffic.

Note: If you only want to enable the IPS blade, you must activate at least one HTTP protection.

  1. Install the Policy.

Verifying the Configuration

To verify the configuration

  1. Browse to any website, such as Google.

  2. Open SmartView Tracker.

  3. Verify that you see traffic from the blade you enabled.

Configuring the Cisco ASA 5505 for Port Mirroring

The Cisco ASA 5505 Adaptive Security Appliance supports SPAN, also known as switch port monitoring, to monitor traffic that enters or exits one or more switch ports. The port where you enable SPAN (destination port) receives a copy of every packet transmitted or received on a specified source port. You can only enable SPAN for one destination port.

Note: BluSapphire Sensor supports both SPAN and RSPAN. It does not support ERSPAN.

To configure the device

  1. Open a monitoring session.

  2. Configure the interface.

#interface <port>

  1. Specify the destination port.

#switchport monitor<destination_port>

  1. Specify the source port.

#switchport monitor<source_port>

Configuring the Cisco Nexus 5000 Series for Port Mirroring

The Cisco Nexus 5000 Series switch supports the switched port analyzer (SPAN) feature, which allows an administrator to analyze all traffic between ports by non-intrusively directing the SPAN session traffic to a SPAN destination port that has an external analyzer attached to it. A source port, also called a monitored port, is a switched interface that you monitor for network traffic analysis. The switch supports any number of ingress source ports (up to the maximum number of available ports on the switch) and any number of source VLANs or VSANs.

Note: BluSapphire Sensor supports both SPAN and RSPAN. It does not support ERSPAN.

To configure the device

  1. Open a monitor session.

  2. Enter global configuration mode.

#configure terminal

  1. Enter interface configuration mode for the specified Ethernet interface selected by the port values.

#interface ethernet [port]

  1. Set the interface to monitor mode.

#switchport monitor

Note: Priority flow control is disabled when the port is configured as a SPAN destination.

  1. Revert the global configuration mode.

#exit

  1. Enter monitor configuration mode.

#monitor session [session-number]

  1. Configure the Ethernet destination port.

#destination interface ethernet [port]

Configuring the Cisco SGxxx Series for Port Mirroring

Cisco switches support a feature known as a Switched Port Analyzer (SPAN) which enables traffic received on an interface or virtual local area network (VLAN) to be sent to a single physical port. SPAN technically implies that the source and destination ports are local to the same switch. If the traffic destination is on another remote switch, it uses Remote SPAN (RSPAN). If the destination requires crossing one or more IP networks, some switches can use Encapsulated Remote SPAN (ERSPAN).

Important: BluSapphire Sensor supports both SPAN and RSPAN. It does not support ERSPAN.

To configure port and VLAN mirroring

  1. On the device, select Administration > Diagnostics > Port and VLAN Mirroring.

  2. If your switch supports RSPAN, complete these steps:

    • RSPAN VLAN: Select Enable to enable RSPAN VLAN mirroring.

    • RSPAN VLAN ID: Select the VLAN to be mirrored.

Note: When you configure a RSPAN mirroring session, you should select this VLAN as the RSPAN VLAN.

  1. Click Add to add a SPAN or RSPAN mirroring session.

  2. Provide the mirror session information:

    • Session ID: Select the identifier for the mirroring session.

    • Session Type: Select the appropriate option:

      • Local Port Based: Copies Tx, Rx, or both Tx and Rx traffic from each port to the destination port.

      • Local VLAN Based: Copies traffic from the local VLAN to the destination port.

      • RSPAN Source Session: Uses a VLAN to copy traffic from a source port or a source VLAN to another device.

      • RSPAN Destination Session: Uses a VLAN to copy traffic from a destination port to another device.

  3. Based on the selected session type, specify the parameters for the session.



    • Destination Port: Select the analyzer port as the destination for the copied packets.

A network analyzer, such as a PC running Wireshark, is connected to this port.

Note: Any port identified as an analyzer destination remains such until all the entries have been removed.

    • Allow Ingress Packets: Select Enable to enable the destination port to receive uncopied ingress packets.

    • Source Port: Select the source ports for the mirrored traffic and the type of traffic to be mirrored to the analyzer port:

      • Rx Only: Port mirroring on incoming packets.

      • Tx Only: Port mirroring on outgoing packets.

      • Tx and Rx: Port mirroring on both incoming and outgoing packets.

      • N/A: Traffic from this port is not mirrored.



    • Destination Port: Select the analyzer port to where packets are copied.

    • Allow Ingress Packets: Select Enable to enable the destination port to receive ingress packets that are not copied.

    • VLAN: Select the source VLAN from where traffic is mirrored.



    • RSPAN VLAN: Select the VLAN to be used to copy traffic to another device.

This VLAN should be the same as the VLAN defined in the RSPAN VLAN ID field.

    • Reflector Port: Select the port or Link Aggregation Group (LAG) to be connected to another device.

    • Source Type: Select Port or VLAN as the source port or source VLAN.

If Port is selected, set the source ports for the mirrored traffic and the type of traffic to be mirrored to the analyzer port.

      • Rx Only: Port mirroring on incoming packets.

      • Tx Only: Port mirroring on outgoing packets.

      • Tx and Rx: Port mirroring on both incoming and outgoing packets.

      • N/A: Traffic from this port is not mirrored.

If VLAN is selected, select a source VLAN.

      • VLAN: Select a VLAN as the source VLAN.



    • RSPAN VLAN: Select the VLAN to be used to copy traffic to another device.

This VLAN should be same as the VLAN defined in the RSPAN VLAN ID field.

    • Destination Port: Select the analyzer port as the destination for the copied packets.

    • Allow Ingress Packets: Select Enable to enable the destination port to receive ingress packets that are not copied.

  1. Click Apply.

This updates the running configuration.

Configuring the Dell Networking Force10 Switch for Port Mirroring

The Dell Networking Force10 Switches support port monitoring on both physical and logical interfaces, such as a virtual local area network (VLAN) and port channel. The monitored (the source) and monitoring ports (the destination) must be on the same switch.

To configure the device

  1. Enter configuration mode:

#configure

  1. Enter the destination port to use for the monitoring session, and confirm that it has no configuration:

#interface te 0/2

  1. Remove any IP addresses that may have previously been configured:

#no ip address

  1. Enable the port:

#no shutdown

  1. Exit the destination port interface:

#exit

  1. Set up and identify the session number (range is from 0 - 65535):

#monitor session 0

  1. Configure the source, the port you want to monitor, the destination port you want to send the monitored packets to, and the direction (both, Rx, or Tx):

#source te 0/1 destination te 0/2 direction both

  1. Verify that port monitoring is active:

#show monitor session 0

Configuring Dell SonicWALL Port Mirroring

You can configure port mirroring on the SonicWALL NSA 2400MX to send a copy of network packets seen on one or more switch ports (or on a virtual local area network [VLAN]) to another switch port, called the mirror port. By connecting to the mirror port, you can monitor the traffic passing through the mirrored ports.

Note: A VLAN trunk port can be mirrored, but cannot act as a mirror port itself.

To create a new port mirroring group

  1. Go to Switching > Port Mirroring.

  2. Click New Group.

  3. In the Edit Mirror Group dialog box, enter a descriptive name for the group into the Interface Group Name field.

  4. For Direction, select one of the following:

    • ingress — Monitors traffic arriving on the mirrored ports.

    • egress — Monitors traffic being sent from the mirrored ports.

    • both — Monitors traffic in both directions on the mirrored ports.

  5. In the All Interfaces list, select the port to use to mirror the traffic, then click the upper right-arrow button to move it to the Mirror Port field.

You must use an unassigned port as the mirror port.

  1. In the All Interfaces list, select one or more ports to monitor, and click the lower right-arrow button to move them to the Mirrored Ports field.

You will be able to monitor traffic on the mirrored ports by connecting to the mirror port.

  1. Select the Enable checkbox to enable port mirroring for these ports.

  2. Click OK.

Configuring the Fortinet FortiGate Switch for Port Mirroring

This procedure explains how to configure Fortinet FortiGate switches for port mirroring on models with built-in hardware switches (for example, the FortiGate-100D, 140D, and 200D), using the Switch Port Analyzer (SPAN) feature.

Configuration Through the CLI

To configure SPAN through the CLI

  1. Enter the following:

config system virtual-switch

edit <port>

set span enable

set span-source-port <port>

set span-dest-port <port>

set span-direction {both | Tx | Rx}

end

end

Configuration Through the Web UI

To configure SPAN through the web UI

  1. Go to System > Network > Interfaces.

  2. Edit a hardware switch interface.

By default, the system may have a hardware switch interface called a LAN. You can also create a new hardware switch interface.

    1. Select the SPAN checkbox, then select a source port from which you want traffic mirrored.

    2. Select one of the following:

      • Traffic received

      • Traffic sent

      • Both

Configuring SPAN on AWS VPCs

Getting Started with VPC Traffic Mirroring

Let’s review the key elements of VPC Traffic Mirroring and then set it up:

  • Mirror Source – An AWS network resource that exists within a particular VPC, and that can be used as the source of traffic. VPC Traffic Mirroring supports the use of Elastic Network Interfaces (ENIs) as mirror sources.

  • Mirror Filter – A specification of the inbound or outbound (with respect to the source) traffic that is to be captured (accepted) or skipped (rejected). The filter can specify a protocol, ranges for the source and destination ports, and CIDR blocks for the source and destination. Rules are numbered, and processed in order within the scope of a particular Mirror Session.

  • Traffic Mirror Session – A connection between a mirror source and target that makes use of a filter. Sessions are numbered, evaluated in order, and the first match (accept or reject) is used to determine the fate of the packet. A given packet is sent to at most one target.

I already have ENI that I will use as my mirror source and destination (in a real-world use case I would probably use an NLB destination):

The MirrorTestENI_Source and MirrorTestENI_Destination ENIs are already attached to suitable EC2 instances. I open the VPC Console and scroll down to the Traffic Mirroring items, then click Mirror Targets:

I click Create traffic mirror target:

I enter a name and description, choose the Network Interface target type, and select my ENI from the menu. I add a Blog tag to my target, as is my practice, and click Create:

My target is created and ready to use:

Now I click Mirror Filters and Create traffic mirror filter. I create a simple filter that captures inbound traffic on three ports (22, 80, and 443), and click Create:

Again, it is created and ready to use in seconds:

Things to Know

Here are a couple of things to keep in mind:

Sessions Per ENI – You can have up to three active sessions on each ENI.

Cross-VPC – The source and target ENIs can be in distinct VPCs as long as they are peered to each other or connected through Transit Gateway.

Scaling & HA – In most cases you should plan to mirror traffic to a Network Load Balancer and then run your capture & analysis tools on an Auto Scaled fleet of EC2 instances behind it.

Bandwidth – The replicated traffic generated by each instance will count against the overall bandwidth available to the instance. If traffic congestion occurs, mirrored traffic will be dropped first.

See in the VMware documentation for more information about VLAN tagging modes.

To learn more about configuring a mirror port on a Check Point gateway, refer to the on the vendor website.

To learn more about configuring port mirroring in the Cisco ASA 5505 device, refer to the on the vendor website.

To learn more about configuring port mirroring for the Cisco Nexus device, refer to the section of the Cisco Nexus 5000 Series NX-OS Software Configuration Guide on the vendor website.

See on the vendor website to learn more about configuring port mirroring on the Cisco SGxxx Series devices.

See on the vendor website to learn more about configuring port mirroring on Fortinet-FortiGate Switches.

Mirror Target – An or that serves as a destination for the mirrored traffic. The target can be in the same AWS account as the Mirror Source, or in a different account for implementation of the central-VPC model that I mentioned above.

You can set this up using the , , or the , with CloudFormation support in the works. I’ll use the Console.

Next, I click Mirror Sessions and Create traffic mirror session. I create a session that uses MirrorTestENI_Source, MainTarget, and MyFilter, allow AWS to choose the , and indicate that I want the entire packet mirrored:

And I am all set. Traffic from my mirror source that matches my filter is encapsulated as specified in and delivered to my mirror target. I can then use tools like to capture, analyze, and visualize it.

VLAN Configuration
Check Point documentation
Cisco ASA 5500-X Series Firewalls - Configuration Guides
Configuring SPAN
SG220-50P Switch documentation
the Knowledge Base article
ENI
Network Load Balancer
VPC Console
EC2 CLI
EC2 API
VXLAN network identifier
RFC 7348
Suricata
packet sniffing tool hotfix