Introduction to Inline SSL Map Workflows
                                                            In GigaVUE‑FM, workflows guide you through configuration steps. For the Inline SSL Map configuration, there are seven flows, Flow A to Flow G based on which you can perform different configurations.
                                                            Go to Workflows and select Inline SSL Map from the Inline GigaSMART Operations section as shown in Figure 1  Select Inline SSL Map Configuration.
                                                            
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    Figure 108
                                                                     | 
                                                                     Select Inline SSL Map Configuration | 
                                                                
                                                            
                                                            Flow A to Flow G are displayed as shown in Figure 2  Flow A to Flow G.
                                                            
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    Figure 109
                                                                     | 
                                                                     Flow A to Flow G | 
                                                                
                                                            
                                                            The following sections describe each flow:
                                                            
                                                            
                                                            
                                                            
                                                            Flow A
                                                            Flow A is for the following use case:
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    ■  
                                                                     | 
                                                                    filter HTTP traffic and direct it to the tool(s) | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    ■  
                                                                     | 
                                                                    filter remaining TCP traffic and direct it to the GigaSMART engine for inspection before forwarding it to the tool(s) | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    ■  
                                                                     | 
                                                                    direct all other traffic to the tool(s) | 
                                                                
                                                            
                                                            Refer to Figure 3  FLOW A Views for a larger view of Flow  A on the left and a pictorial view on the right.
                                                            
                                                                
                                                            
                                                            
                                                            The map priorities of Flow A are as follows:
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    1.  
                                                                     | 
                                                                    limit traffic going to decryption | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    2. 
                                                                     | 
                                                                    selectively forward traffic for decryption | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    3. 
                                                                     | 
                                                                    direct unselected traffic to a collector, which sends traffic to tool | 
                                                                
                                                            
                                                            Flow B
                                                            Flow B is for the following use case:
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    ■  
                                                                     | 
                                                                    filter HTTP traffic and direct it to the tool(s) | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    ■  
                                                                     | 
                                                                    filter remaining TCP traffic and direct it to the GigaSMART engine for inspection before forwarding it to the tool(s) | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    ■  
                                                                     | 
                                                                    bypass all other traffic | 
                                                                
                                                            
                                                            Refer to Figure 4  FLOW B Views for a larger view of Flow  B on the left and a pictorial view on the right.
                                                            
                                                                
                                                            
                                                            
                                                            The map priorities of Flow B are as follows:
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    1.  
                                                                     | 
                                                                    limit traffic going to decryption | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    2. 
                                                                     | 
                                                                    selectively forward traffic for decryption | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    3. 
                                                                     | 
                                                                    direct unselected traffic to a collector, which sends traffic to bypass | 
                                                                
                                                            
                                                            Flow C
                                                            Flow C is for the following use case:
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    ■  
                                                                     | 
                                                                    filter traffic from or to certain VLANs (for example, a guest WiFi VLAN) and direct it to bypass | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    ■  
                                                                     | 
                                                                    filter remaining TCP traffic and direct it to the GigaSMART engine for inspection before forwarding it to the tool(s) | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    ■  
                                                                     | 
                                                                    direct all other traffic to the tool(s) | 
                                                                
                                                            
                                                            Refer to Figure 5  FLOW C Views for a larger view of Flow  C on the left and a pictorial view on the right.
                                                            
                                                                
                                                            
                                                            
                                                            The map priorities of Flow C are as follows:
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    1.  
                                                                     | 
                                                                    send trusted traffic to bypass | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    2. 
                                                                     | 
                                                                    selectively forward traffic for decryption | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    3. 
                                                                     | 
                                                                    direct unselected traffic to a collector, which sends traffic to tool | 
                                                                
                                                            
                                                            Flow D
                                                            Flow D is for the following use case:
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    ■  
                                                                     | 
                                                                    filter traffic from certain VLANs (for example, an employee WiFi VLAN) and direct it to the GigaSMART engine for inspection before forwarding it to the tool(s) | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    ■  
                                                                     | 
                                                                    filter traffic from or to selected internal servers and direct it to bypass | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    ■  
                                                                     | 
                                                                    direct all other traffic to tool(s) | 
                                                                
                                                            
                                                            Refer to Figure 6  FLOW D Views for a larger view of Flow  D on the left and a pictorial view on the right.
                                                            
                                                                
                                                            
                                                            
                                                            The map priorities of Flow D are as follows:
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    1.  
                                                                     | 
                                                                    selectively forward traffic for decryption | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    2. 
                                                                     | 
                                                                    send trusted traffic to bypass | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    3. 
                                                                     | 
                                                                    direct unselected traffic to a collector, which sends traffic to tool | 
                                                                
                                                            
                                                            Flow E
                                                            Flow E is for the following use case:
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    ■  
                                                                     | 
                                                                    filter traffic from certain VLANs (for example, an employee WiFi VLAN) and direct it to the GigaSMART engine for inspection before forwarding it to the tool(s) | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    ■  
                                                                     | 
                                                                    filter traffic from or to selected internal servers and direct it to the tool(s) | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    ■  
                                                                     | 
                                                                    bypass all other traffic | 
                                                                
                                                            
                                                            Refer to Figure 7  FLOW E Views for a larger view of Flow  E on the left and a pictorial view on the right.
                                                            
                                                                
                                                            
                                                            
                                                            The map priorities of Flow E are as follows:
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    1.  
                                                                     | 
                                                                    selectively forward traffic for decryption | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    2. 
                                                                     | 
                                                                    send remaining IP traffic to tool(s) | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    3. 
                                                                     | 
                                                                    direct non-IP traffic to a collector, which sends traffic to bypass | 
                                                                
                                                            
                                                            Flow F
                                                            Flow F is for the following use case:
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    ■  
                                                                     | 
                                                                    filter TCP traffic and direct it to the GigaSMART engine for inspection before forwarding it to the tool(s) | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    ■  
                                                                     | 
                                                                    direct all other traffic to the tool(s) | 
                                                                
                                                            
                                                            Refer to Figure 8  FLOW F Views for a larger view of Flow  F on the left and a pictorial view on the right.
                                                            
                                                                
                                                            
                                                            
                                                            The map priorities of Flow F are as follows:
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    1.  
                                                                     | 
                                                                    selectively forward traffic for decryption | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    2. 
                                                                     | 
                                                                    direct unselected traffic to a collector, which sends traffic to tool | 
                                                                
                                                            
                                                            Flow G
                                                            Flow G is for the following use case:
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    ■  
                                                                     | 
                                                                    filter TCP traffic and direct it to the GigaSMART engine for inspection before forwarding it to the tool(s) | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    ■  
                                                                     | 
                                                                    bypass all other traffic | 
                                                                
                                                            
                                                            Refer to Figure 9  FLOW G Views for a larger view of Flow  G on the left and a pictorial view on the right.
                                                            
                                                                
                                                            
                                                            
                                                            The map priorities of Flow G are as follows:
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    1.  
                                                                     | 
                                                                    selectively forward traffic for decryption | 
                                                                
                                                            
                                                            
                                                                
                                                                
                                                                
                                                                
                                                                     | 
                                                                    2. 
                                                                     | 
                                                                    direct unselected traffic to a collector, which sends traffic to bypass |