Configure UCT-C Features
Refer to the following sections for more detailed information:
Configure Precryption in UCT-C
GigaVUE-FM allows you to enable or disable the Precryption feature.
Rules and Notes
The following are the memory limits to be applied to UCT-C:
The memory limit changes depending on the number of vCPUs in the worker node. For example, if the worker node has 16 vCPUs, the Precryption feature consumes around 1GB of memory (16 * 64 MB). |
When you deploy secure tunnels, it requires additional (16 *64 MB) memory. Hence, the total memory that you must allocate for the TAP is 1 GB. |
You can always configure the memory allocation using PRECRYPTION_RING_BUFFER_MEMORY_MB in YAML file. |
Protocol version IPv4 and IPv6 are supported. |
If you wish to use IPv6 tunnels, your GigaVUE‑FM and the fabric components version must be 6.6.00 or above. |
The YAML configuration option allows you to choose the amount of buffer size.
To configure the Precryption feature in UCT-C, follow the steps listed in Configure Traffic Policy.
Note: You can deploy only one Precryption policy per Monitoring Domain.
After enabling the Precryption, configure the Create Source Selectors, and the Rules.
Selective Precryption
GigaVUE-FM allows you to filter packets during the Precryption in the Data Acquisition at the UCT-C level. This filtering is done based on L3/L4 5 tuple information (5-tuple filtering) running on the containers.
Refer to Enable Selective Precryption for information on how to configure Selective Precryption when configuring the Rules.
Enable Selective Precryption
If you wish to use selective Precryption, follow the steps given below:
1. | Disable the Enable toggle button to turn off the default passall rule. |
2. | Click ![]() |
3. | Enter the name of the rule and choose Pass (passes the traffic) or Drop (drops the traffic) in Action menu. |
Note: In the absence of a Precryption rule, traffic is implicitly allowed. However, once rules are defined, they include an implicit pass all rule. If the traffic is not conformed to any of the specified rules, it will be passed.
4. | Select the direction from the below options: |
• | Bi-directional -Allows the traffic in both directions of the flow. A single Bi-direction rule should consist of 1 Ingress and 1 Egress rule. |
• | Ingress- Filters the traffic that flows in. |
• | Egress - Filters the traffic that flows out. |
5. | Select the value of the priority based on which the rules must be prioritized for filtering. Select the value as 1 to pass or drop a rule in top priority. Similarly, you can select the value as 2, 3, 4 to 8, where 8 can be used for setting a rule with the least priority. Drop rules are added based on the priority and, then pass rules are added. |
6. | Select the required Filter Type (L3 or L4). |
a. | For L3: |
Select the required Filter Name. The available options are IPv4 Source, IPv4 Destination, IPv6 Source, IPv6 Destination, and Protocol (common for both IPv4 and IPv6).
Enter or select the Filter Value based on the selected Filter Name.
Note: When using Protocol as the Filter Name, select TCP from the drop-down menu.
b. | For L4: |
Select the required Filter Name. The available options are Source Port and Destination Port.
Select the Filter Relation. The available options are Not Equal to and Equal to.
Enter the source or destination port value.
Configure Secure Tunnels in UCT-C
Secure tunnel can be configured on:
Precryption Traffic
You can send the Precryption traffic through secure tunnel. When secure tunnel for Precryption is enabled, packets are framed and sent to the TLS socket. PCAPng format is used to send the packet.
When you enable the secure tunnel option for both regular and Precryption packets, two TLS secure tunnel sessions will be created.
It is recommended to always enable secure tunnels for Precryption traffic to securely transfer the sensitive information.
For more information about PCAPng, refer to PCAPng Application
Mirrored Traffic
You can enable the Secure Tunnel for mirrored traffic. By default, Secure Tunnel is disabled.
Prerequisites
While creating Secure Tunnel, you must provide the following details:
SSH key pair |
CA certificate |
Configure Secure Tunnels from UCT-C Container to GigaVUE V Series Node
To configure a secure tunnel in a UCT-C Container, you must configure one end of the tunnel to the UCT-C and the other end to a GigaVUE V Series node. You must configure CA certificates in UCT Container, and the private keys and SSL certificates in the GigaVUE V Series Node. Refer to the following steps for configuration:
1. | Upload a Custom Certificate: |
a. | You must upload a CA to UCT-C Container for establishing a connection with the GigaVUE V Series node. |
b. | Go to Inventory > Resources > Security > CA List. |
c. | Click Add. The Add Certificate Authority page appears. |
d. | Enter the Alias and choose the certificate from the desired location. |
e. | Click Save. For more information, refer to Adding Certificate Authority. |
2. | Upload an SSL Key - To add an SSL Key to GigaVUE V Series node, follow the steps in the section |
3. | Select the SSL Key when you create a Monitoring Domain and configure the fabric components in GigaVUE-FM. |
4. | Select the CA certificate when you create a monitoring domain and configuring the fabric components in GigaVUE-FM. To select the CA certificate, follow the steps in the section Create Monitoring Domain. |
5. | Create and add the secure tunnel when you configure the traffic policy. Refer to Configure Traffic Policy. |
Adding Certificate Authority
The Certificate Authority (CA) List page allows you to add the root CA for the devices.
To upload the CA using GigaVUE-FM follow the steps given below:
- Go to Inventory > Resources > Security > CA List.
- Click Add, to add a new Custom Authority. The Add Certificate Authority page appears.
- In the Alias field, enter the alias name of the Certificate Authority.
- Use one of the following options to enter the Certificate Authority:
- Copy and Paste: In the Certificate field, enter the certificate.
- Install from URL: In the Path field, enter the URL in the format: <protocol>://<username>@<hostname/IP address>/<file path>/<file name>. In the Password field, enter the password.
- Install from Local Directory: Click Choose File to browse and select a certificate from the local directory.
- Click Save.