Configure Secure Tunnel (Azure)
You can configure secure tunnels for:
Precrypted Traffic
You can send the precrypted traffic through a secure tunnel. When secure tunnels for Precryption is enabled,
-
Packets are framed and sent to the TLS socket.
-
The packets are sent in PCAPng format.
-
When you enable the secure tunnel option for regular and precrypted packets, two TLS secure tunnel sessions are created.
We recommend to enable secure tunnels for precrypted traffic to securely transfer the sensitive information.
For more information about PCAPng, refer toPCAPng Application.
Mirrored Traffic
You can enable the Secure Tunnel for mirrored traffic. By default, Secure Tunnel is disabled.
Refer to the following sections for Secure Tunnel Configuration:
| Configure Secure Tunnel from UCT-V to GigaVUE V Series Node in UCT-V |
| Configure Secure Tunnel between GigaVUE V Series Nodes |
Prerequisites
| Enable Port 11443 in security group settings. For details, refer to Network Security Groups. |
| While creating Secure Tunnel, you must provide the following details: |
| • | SSH key pair |
| • | CA Certificate chain |
Notes
| Protocol versions IPv4 and IPv6 are supported. |
| If you wish to use IPv6 tunnels, your GigaVUE‑FM and the fabric components version must be 6.6.00 or above. |
| For UCT-V with a version lower than 6.6.00, if the secure tunnel is enabled in the monitoring session, secure mirror traffic will be transmitted over IPv4, regardless of IPv6 preference. |
Configure Secure Tunnel from UCT-V to GigaVUE V Series Node
To configure a secure tunnel in UCT-V, you must configure one end of the tunnel to the UCT-V and the other end to GigaVUE V Series Node. You must configure the CA Certificate chain in UCT-V and the private keys and SSL certificates in GigaVUE V Series Node.
Refer to the following steps for configuration:
| S. No |
Task |
Refer to | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
1 |
Upload a CA Certificate chain in a single file |
You must upload a CA Certificate chain to UCT-V Controller to establish a connection with the GigaVUE V Series Node. To upload the CA Certificate chain using GigaVUE‑FM, follow the steps given below:
Note: Ensure that the Intermediate CA Certificate(s) are included in the CA certificate chain file in the correct signing order, followed by the Root CA Certificate at the end. For more information, refer to the section Adding Certificate Authority |
|||||||||||||||
|
2 |
Upload an SSL Key Pair |
You must add an SSL key pair to the GigaVUE V Series Node. Follow the steps in the section SSL Decrypt |
|||||||||||||||
|
3 |
Select the SSL Key Pair while creating a monitoring domain and configuring the fabric components in GigaVUE-FM. |
You must select the added SSL Key Pair in the GigaVUE V Series Node while creating a monitoring domain configuring the fabric components in GigaVUE‑FM. To select the SSL key pair, follow the steps in the section Configure GigaVUE Fabric Components in GigaVUE‑FM. If the existing monitoring domain does not have a SSL key pair, you can add it by following the given steps:
|
|||||||||||||||
|
4 |
Select CA Certificate chain while creating the monitoring domain configuring the fabric components in GigaVUE-FM. |
You should select the added CA Certificate chain in UCT-V Controller. To select the CA Certificate chain, follow the steps in the sectionConfigure GigaVUE Fabric Components in GigaVUE-FMConfigure GigaVUE Fabric Components in GigaVUE‑FM. |
|||||||||||||||
|
5 |
Enable the secure tunnel |
You should enable the secure tunnel feature to establish a connection between the UCT-V and GigaVUE V Series Node. To enable the secure tunnel, follow these steps:
Note: When GigaVUE V Series Node is upgraded or deployed to 6.5, all the existing monitoring sessions will be redeployed, and individual TLS TEPs are created for each UCT-V. |
Configure Secure Tunnel between GigaVUE V Series Nodes
You can create secure tunnel:
| Between two GigaVUE V Series Nodes. |
| From one GigaVUE V Series Node to multiple GigaVUE V Series Nodes. |
You must have the following details before you start configuring secure tunnels between two GigaVUE V Series Nodes:
| IP address of the tunnel destination endpoint (Second GigaVUE V Series Node). |
| SSH key pair (pem file). |
To configure secure tunnel between two GigaVUE V Series Nodes, refer to the following steps:
| S. No |
Task |
Refer to | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
1. |
Upload a CA Certificate chain in a single file |
You must upload a CA Certificate chain to UCT-V Controller to establish a connection between the GigaVUE V Series Node. To upload the CA Certificate chain using GigaVUE‑FM follow the steps given below:
Note: Ensure that the Intermediate CA Certificate(s) are included in the CA certificate chain file in the correct signing order, followed by the Root CA Certificate at the end. For more information, refer to the section Adding Certificate Authority |
||||||||||||||||||||||||||||||||||||||||||||||||
|
2. |
Upload an SSL Key Pair |
You must add an SSL key pair to GigaVUE V Series Node. Follow the steps in the section SSL DecryptSSL Decrypt |
||||||||||||||||||||||||||||||||||||||||||||||||
|
3 |
Select the added SSL Key Pair while creating a Monitoring Domain. |
Select the added SSL Key Pair while creating a Monitoring Domain and configuring the fabric components in GigaVUE‑FM in the first GigaVUE V Series Node . You must select the added SSL Key Pair for the first GigaVUE V Series Node. To select the SSL key pair, follow the steps in the section Configure GigaVUE Fabric Components in GigaVUE‑FM |
||||||||||||||||||||||||||||||||||||||||||||||||
|
4 |
Select the added CA Certificate chain while creating the Monitoring Domain |
You should select the added CA Certificate chain in UCT-V Controller. To select the CA Certificate chain, follow the steps in the section Configure GigaVUE Fabric Components in GigaVUE‑FM
|
||||||||||||||||||||||||||||||||||||||||||||||||
|
5 |
Create a secure tunnel between UCT-V and the first GigaVUE V Series Node |
You should enable the secure tunnel feature to establish a connection between the UCT-V and the first GigaVUE V Series Node. To enable the secure tunnel feature follow these steps:
|
||||||||||||||||||||||||||||||||||||||||||||||||
|
6 |
Create an Egress tunnel from the first GigaVUE V Series Node with tunnel type as TLS-PCAPNG in the Monitoring Session |
You must create a tunnel for traffic to flow out from the first GigaVUE V Series Node with tunnel type as TLS-PCAPNG in the Monitoring Session. For details, refer to Create Ingress and Egress Tunnels (Azure). To create the egress tunnel, follow these steps:
|
||||||||||||||||||||||||||||||||||||||||||||||||
|
7. |
Select the added SSL Key Pair while creating a Monitoring Domain and configuring the fabric components in GigaVUE‑FM in second GigaVUE V Series Node |
You must select the added SSL Key Pair in second GigaVUE V Series Node. To select the SSL key pair, follow the steps in the section Configure GigaVUE Fabric Components in GigaVUE‑FM |
||||||||||||||||||||||||||||||||||||||||||||||||
|
8 |
Create an ingress tunnel for the second GigaVUE V Series Node with tunnel type as TLS-PCAPNG in the Monitoring Session |
You must create a ingress tunnel for traffic to flow in from the GigaVUE V Series Node with tunnel type as TLS-PCAPNG while creating the monitoring session. For details, refer to Create a Monitoring Session (Azure).
To create the ingress tunnel, follow these steps:
Note: If you are enabling Secure tunnel in Monitoring Session with traffic acquisition method as UCT-V, you must not create TLS-PCAPNG Tunnel with direction IN, Destination L4 port 11443, and GigaVUE V Series Node version 6.5 and above.
|



