Configure Secure Tunnel for Third Party Orchestration
The Secure tunnels can be configured on:
Precrypted Traffic
You can send the precrypted traffic through a secure tunnel. When secure tunnels for Precryption is enabled, packets are framed and sent to the TLS socket. The packets are sent in PCAPng format.
When you enable the secure tunnel option for regular and precrypted packets, two TLS secure tunnel sessions are created.
It is recommended always to enable secure tunnels for precrypted traffic to securely transfer the sensitive information.
For more information about PCAPng, refer toPCAPng Application.
Mirrored Traffic
You can enable the Secure Tunnel for mirrored traffic. By default, Secure Tunnel is disabled.
Refer to the following sections for Secure Tunnel Configuration:
Configure Secure Tunnel from UCT-V to GigaVUE V Series Node in UCT-V |
Configure Secure Tunnel between GigaVUE V Series Nodes |
Prerequisites
While creating Secure Tunnel, you must provide the following details: |
• | SSH key pair |
• | CA certificate |
Port 11443 should be enabled in security group settings. Refer to Network Firewall RequirementSecurity Group for OpenStack for more detailed information on Network Firewall / Security Group. |
Notes
Protocol versions IPv4 and IPv6 are supported. |
If you wish to use IPv6 tunnels, your GigaVUE‑FM and the fabric components version must be 6.6.00 or above. |
For UCT-V with a version lower than 6.6.00, if the secure tunnel is enabled in the Monitoring Session, secure mirror traffic will be transmitted over IPv4, regardless of IPv6 preference. |
After configuring secure tunnels, if a Monitoring Domain has only one GigaVUE V Series Node and that GigaVUE V Series Node reboots or restarts, then the SSL Keys must be manually added to the Monitoring Domain again. Refer to Edit SSL Configuration for more detailed information on how to add SSL keys to a Monitoring Domain. |
Configure Secure Tunnel from UCT-V to GigaVUE V Series Node
To configure a secure tunnel in UCT-V, you must configure one end of the tunnel to the UCT-V and the other end to GigaVUE V Series Node. You must configure the CA certificates in UCT-V and the private keys and SSL certificates in GigaVUE V Series Node. Refer to the following steps for configuration:
S. No |
Task |
Refer to | ||||||
---|---|---|---|---|---|---|---|---|
1. |
Upload a Custom Authority Certificate (CA) |
You must upload a Custom Certificate to UCT-V Controller for establishing a connection with the GigaVUE V Series Node. To upload the CA using GigaVUE-FM follow the steps given below:
For more information, refer to the section Adding Certificate Authority |
||||||
2. |
Upload a SSL Key |
You must add a SSL key to GigaVUE V Series Node. To add SSL Key, follow the steps in the section SSL Decrypt |
||||||
3 |
Enable the secure tunnel |
You should enable the secure tunnel feature to establish a connection between the UCT-V and GigaVUE V Series Node. To enable the secure tunnel feature follow these steps:
|
||||||
4. |
Select the SSL Key and CA certificate, after deploying the fabric components. |
You must select the added SSL Key and CA Authority in GigaVUE V Series Node after creating a Monitoring Domain configuring the fabric components in GigaVUE‑FM. Refer to Edit SSL Configuration for more detailed information on how to select the added SSL Key and CA Authority in GigaVUE V Series Node. |
Configure Secure Tunnel between GigaVUE V Series Nodes
You can create secure tunnel:
Between two GigaVUE V Series Nodes. |
From one GigaVUE V Series Node to multiple GigaVUE V Series Nodes. |
You must have the following details before you start configuring secure tunnels between two GigaVUE V Series Nodes:
IP address of the tunnel destination endpoint (Second GigaVUE V Series Node). |
SSH key pair (pem file). |
To configure secure tunnel between two GigaVUE V Series Nodes, refer to the following steps:
S. No |
Task |
Refer to | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1. |
Upload a Certificate Authority (CA) Certificate |
You must upload a Custom Certificate to UCT-V Controller to establish a connection between the GigaVUE V Series Node. To upload the CA using GigaVUE-FM follow the steps given below:
For more information, refer to the section Adding Certificate Authority |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2. |
Upload an SSL Key |
You must add an SSL key to GigaVUE V Series node. To add an SSL Key, follow the steps in the section Upload SSL Keys |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3 |
Create a secure tunnel between UCT-V and the first GigaVUE V Series Node |
You should enable the secure tunnel feature to establish a connection between the UCT-V and the first GigaVUE V Series Node. To enable the secure tunnel feature follow these steps:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
4 |
Select the SSL Key and CA certificate, after deploying the fabric components. |
You must select the added SSL Key and CA Authority in GigaVUE V Series Node after creating a Monitoring Domain configuring the fabric components in GigaVUE‑FM. Refer to Edit SSL Configuration for more detailed information on how to select the added SSL Key and CA Authority in GigaVUE V Series Node. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
5 |
Create an Egress tunnel from the first GigaVUE V Series Node with tunnel type as TLS-PCAPNG while creating the Monitoring Session. |
You must create a tunnel for traffic to flow out from the first GigaVUE V Series Node with tunnel type as TLS-PCAPNG while creating the Monitoring Session. Refer to Create Ingress and Egress Tunnels (Azure) for more detailed information on how to create tunnels. To create the egress tunnel, follow these steps:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
6 |
Select the added SSL Key after deploying the fabric components in the second GigaVUE V Series Node |
You must select the added SSL Key in the second GigaVUE V Series Node. Select the the second GigaVUE V Series Node and follow the steps given in Edit SSL Configuration. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7 |
Create an ingress tunnel in the second GigaVUE V Series Node with tunnel type as TLS-PCAPNG while creating the Monitoring Session for the second GigaVUE V Series Node. |
You must create a ingress tunnel for traffic to flow in from the first GigaVUE V Series Node with tunnel type as TLS-PCAPNG while creating the Monitoring Session. Refer to Create a Monitoring Session (Azure) to know about Monitoring Session.
To create the ingress tunnel, follow these steps:
|