Use ERSPAN to Send Mirrored Traffic through GRE Tunnels
Table of Contents
Expand all | Collapse all
-
- Firewall and PAN-OS Support of IoT Security
- IoT Security Prerequisites
- Onboard IoT Security
- Onboard IoT Security on VM-Series with Software NGFW Credits
-
- DHCP Data Collection by Traffic Type
- Firewall Deployment Options for IoT Security
- Configure a Pre-PAN-OS 10.0 Firewall with a DHCP Server
- Configure a Pre-PAN-OS 10.0 Firewall for a Local DHCP Server
- Use a Tap Interface for DHCP Visibility
- Use a Virtual Wire Interface for DHCP Visibility
- Use SNMP Network Discovery to Learn about Devices from Switches
- Use Network Discovery Polling to Discover Devices
- Use ERSPAN to Send Mirrored Traffic through GRE Tunnels
- Use DHCP Server Logs to Increase Device Visibility
- Plan for Scaling when Your Firewall Serves DHCP
- Prepare Your Firewall for IoT Security
- Configure Policies for Log Forwarding
- Control Allowed Traffic for Onboarding Devices
- Support Isolated Network Segments
- IoT Security Integration with Prisma Access
- IoT Security Licenses
- Offboard IoT Security Subscriptions
-
- Introduction to IoT Security
- IoT Security Integration with Next-generation Firewalls
- IoT Security Portal
- Vertical-themed Portals
- Device-to-Site Mapping
- Sites and Site Groups
- Networks
- Reports
- IoT Security Integration Status with Firewalls
- IoT Security Integration Status with Prisma Access
- Data Quality Diagnostics
- Authorize On-demand PCAP
- IoT Security Integrations with Third-party Products
- IoT Security and FedRAMP
Use ERSPAN to Send Mirrored Traffic through GRE Tunnels
Use ERSPAN to collect IoT device traffic data from switches
and send it through GRE tunnels to a firewall.
Unless device traffic is visible to a firewall,
the firewall cannot include it in the logs it forwards to IoT Security.
When you need to collect data for devices whose traffic doesn't
pass through a firewall, mirror their traffic on network switches
and use Encapsulated Remote Switched Port Analyzer (ERSPAN) to send
it to the firewall through a Generic Routing Encapsulation
(GRE) tunnel. After the firewall decapsulates the traffic,
it inspects it similar to traffic received on a TAP port. The firewall
then creates enhanced application logs (EALs) and traffic, threat,
WildFire, URL, data, GTP (when GTP is enabled), SCTP (when SCTP
is enabled), tunnel, auth, and decryption logs. It forwards them to
the logging service where IoT Security can access and analyze the
IoT device data.
You can use this feature for any deployments
where traffic from remote switches needs to be inspected. IoT Security
is just one use case.
This
feature requires switches that support ERSPAN such as Catalyst 6500,
7600, Nexus, and ASR 1000 platforms.
- Configure a switch that supports ERSPAN to mirror traffic on one or more source ports or VLANs, and forward it through a GRE tunnel to a destination port on a next-generation firewall.For configuration instructions, see the Cisco documentation for your switch.
- Enable ERSPAN support on the firewall.By default, ERSPAN support is disabled.
- Log in to the firewall and select.DeviceSession
- Click theEditicon for Session Settings, selectEnable ERSPAN Support, and then clickOK.The ERSPAN Support check box in the Session Settings section is now selected.
- Commityour change.
- Create a Layer 3 security zone specifically to terminate the GRE tunnel and receive mirrored IoT device traffic from the source port on the network switch.
- Selectand thenNetworkZonesAdda zone.
- Enter the following and leave the other settings at their default values:Name: Enter a meaningful name for the zone such asERSPAN-IoT-data.Log Setting: SelectIoT Security Default Profileor another log forwarding profile that sends the required types of logs to the logging service for IoT Security.You must already have logging services enabled on the firewall.Type:Layer3
- ClickOK.
- Create a Layer 3 interface and bind it to the zone you just created.
- Selectand then click the Ethernet interface on which you want to terminate the GRE tunnel from the switch. Optionally, use a subinterface.NetworkInterfacesEthernet
- Enter the following and leave the other settings at their default values:Comment: Enter a meaningful note about the interface for later reference.Interface Type:Layer3Virtual Router: Choose the virtual router you want to route to the interface. Consider using a separate virtual router exclusively for ERSPAN traffic.Security Zone: Choose the zone you just created.
- ClickIPv4, selectStaticfor the address type, andAddan IP address for the interface.The switch uses this in its GRE tunnel configuration as the IP address of its peer.
- ClickAdvancedand either add aNew Management Profileor select a previously defined profile that allows the Ethernet interface to accept different types of administrative traffic.
- ClickOKto save the new interface management profile and then clickOKagain to save the Ethernet interface configuration.
- Create a tunnel interface with an IP address in the same subnet as that of the corresponding tunnel interface on the switch and bind it to the zone you just created.
- Selectand thenNetworkInterfacesTunnelAddthe logical tunnel interface for the GRE tunnel from the switch.
- Enter the following and leave the other settings at their default values:Interface Name: The field on the left is read-only and contains the text “tunnel”. Enter a number in the field on the right to complete the name. For example, enter8to make the nametunnel.8.Virtual Router: Choose the same router you used for the Layer 3 interface.Security Zone: Choose the same zone to which you bound the Layer 3 interface.
- ClickIPv4andAddan IP address that’s in the same subnet as the IP address of the logical tunnel interface on the switch.
- ClickAdvancedand either add aNew Management Profile, or select a previously defined profile, to allow the tunnel interface to accept different types of administrative traffic.
- ClickOK.
- Configure static routes for the virtual router (VR) for ERSPAN.
- Selectand then click the virtual router for ERSPAN.NetworkVirtual Routers
- ClickStatic Routesand then click+ Add.
- Enter the following and leave the other settings at their default values:Name: Enter a name for the static route.Destination:0.0.0.0/0If you know the subnets beyond the switch, create individual static routes for each of them. Otherwise, use a separate VR for ERSPAN and set a default route.Interface:ethernet1/3(the interface you previously configured)Next Hop:None
- ClickOK.
- Configure a GRE tunnel with ERSPAN enabled.
- Selectand then clickNetworkGRE Tunnels+ Add.
- Enter the following and leave the other settings at their default values:Name: Enter a name for the GRE tunnel; for example,GRE-ESPAN-for-IoT-dataInterface: Choose the Layer 3 interface you configured for GRE tunnel termination.Local Address: ChooseIPand the IP address of the Layer 3 interface where the GRE tunnel terminates.Peer Address: Enter the IP address of the switch egress interface from which it initiates the GRE tunnel.Tunnel Interface: Choose the logical tunnel interface you configured for the GRE tunnel.ERSPAN: (select)
- ClickOK.The IP addresses of the Ethernet and tunnel interfaces in relation to each other and the rest of the network look like this.
- Commityour changes.