Introduction to Inline SSL Map Workflows

In GigaVUE-FM, workflows guide you through configuration steps. For the Inline SSL Map configuration, there are seven flows, Flow A to Flow G based on which you can perform different configurations.

Go to Workflows and select Inline SSL Map from the Inline GigaSMART Operations section as shown in Figure 1 Select Inline SSL Map Configuration.

Figure 91 Select Inline SSL Map Configuration

Flow A to Flow G are displayed as shown in Figure 2 Flow A to Flow G.

Figure 92 Flow A to Flow G

The following sections describe each flow:

Flow D
Flow E
Flow F
Flow G

Flow A

Flow A is for the following use case:

filter HTTP traffic and direct it to the tool(s)
filter remaining TCP traffic and direct it to the GigaSMART engine for inspection before forwarding it to the tool(s)
direct all other traffic to the tool(s)

Refer to Figure 3 FLOW A Views for a larger view of Flow  A on the left and a pictorial view on the right.

Figure 93 FLOW A Views

The map priorities of Flow A are as follows:

1.   limit traffic going to decryption
2. selectively forward traffic for decryption
3. direct unselected traffic to a collector, which sends traffic to tool

Flow B

Flow B is for the following use case:

filter HTTP traffic and direct it to the tool(s)
filter remaining TCP traffic and direct it to the GigaSMART engine for inspection before forwarding it to the tool(s)
bypass all other traffic

Refer to Figure 4 FLOW B Views for a larger view of Flow  B on the left and a pictorial view on the right.

Figure 94 FLOW B Views

The map priorities of Flow B are as follows:

1.   limit traffic going to decryption
2. selectively forward traffic for decryption
3. direct unselected traffic to a collector, which sends traffic to bypass

Flow C

Flow C is for the following use case:

filter traffic from or to certain VLANs (for example, a guest WiFi VLAN) and direct it to bypass
filter remaining TCP traffic and direct it to the GigaSMART engine for inspection before forwarding it to the tool(s)
direct all other traffic to the tool(s)

Refer to Figure 5 FLOW C Views for a larger view of Flow  C on the left and a pictorial view on the right.

Figure 95 FLOW C Views

The map priorities of Flow C are as follows:

1.   send trusted traffic to bypass
2. selectively forward traffic for decryption
3. direct unselected traffic to a collector, which sends traffic to tool

Flow D

Flow D is for the following use case:

filter traffic from certain VLANs (for example, an employee WiFi VLAN) and direct it to the GigaSMART engine for inspection before forwarding it to the tool(s)
filter traffic from or to selected internal servers and direct it to bypass
direct all other traffic to tool(s)

Refer to Figure 6 FLOW D Views for a larger view of Flow  D on the left and a pictorial view on the right.

Figure 96 FLOW D Views

The map priorities of Flow D are as follows:

1.   selectively forward traffic for decryption
2. send trusted traffic to bypass
3. direct unselected traffic to a collector, which sends traffic to tool

Flow E

Flow E is for the following use case:

filter traffic from certain VLANs (for example, an employee WiFi VLAN) and direct it to the GigaSMART engine for inspection before forwarding it to the tool(s)
filter traffic from or to selected internal servers and direct it to the tool(s)
bypass all other traffic

Refer to Figure 7 FLOW E Views for a larger view of Flow  E on the left and a pictorial view on the right.

Figure 97 FLOW E Views

The map priorities of Flow E are as follows:

1.   selectively forward traffic for decryption
2. send remaining IP traffic to tool(s)
3. direct non-IP traffic to a collector, which sends traffic to bypass

Flow F

Flow F is for the following use case:

filter TCP traffic and direct it to the GigaSMART engine for inspection before forwarding it to the tool(s)
direct all other traffic to the tool(s)

Refer to Figure 8 FLOW F Views for a larger view of Flow  F on the left and a pictorial view on the right.

Figure 98 FLOW F Views

The map priorities of Flow F are as follows:

1.   selectively forward traffic for decryption
2. direct unselected traffic to a collector, which sends traffic to tool

Flow G

Flow G is for the following use case:

filter TCP traffic and direct it to the GigaSMART engine for inspection before forwarding it to the tool(s)
bypass all other traffic

Refer to Figure 9 FLOW G Views for a larger view of Flow  G on the left and a pictorial view on the right.

Figure 99 FLOW G Views

The map priorities of Flow G are as follows:

1.   selectively forward traffic for decryption
2. direct unselected traffic to a collector, which sends traffic to bypass