Decrypt Mirror Interface
- Network > Interfaces > Ethernet
To use the Decryption Port Mirror feature, you must select the Decrypt Mirror interface type. This feature enables creating a copy of decrypted traffic from a firewall and sending it to a traffic collection tool that can receive raw packet captures—such as NetWitness or Solera—for archiving and analysis. Organizations that require comprehensive data capture for forensic and historical purposes or data leak prevention (DLP) functionality require this feature. To enable the feature, you must acquire and install the free license.
Decryption port mirroring is not available on the VM-Series for public cloud platforms (AWS, Azure, Google Cloud Platform), VMware NSX, and Citrix SDX.
To configure a decrypt mirror interface, click the name of an Interface (ethernet1/1, for example) that is not configured and specify the following information.
Decrypt Mirror Interface Settings
The interface name is predefined and you cannot change it.
Enter an optional description for the interface.
Select Decrypt Mirror.
Select the interface speed in Mbps (10, 100, or 1000), or select auto to have the firewall automatically determine the speed.
Select whether the interface transmission mode is full-duplex (full), half-duplex (half), or negotiated automatically (auto).
Select whether the interface status is enabled (up), disabled (down), or determined automatically (auto).
Configure Decryption Port Mirroring
Where permitted by law, you can decrypt traffic and send the cleartext (unencrypted) traffic to a device that can archive and analyze the traffic. ...
Decryption Mirroring The decryption mirroring feature provides the capability to create a copy of decrypted traffic from a firewall and send it to a traffic ...
Decryption Profile General Settings
Decryption Profile General Settings The following table describes the general settings for decryption profiles. Decryption Profile — General Settings Description Name Enter a profile name ...
Create a Decryption Profile
Attach Decryption profiles to Decryption policy rules to control the protocol versions, algorithms, verification checks, and session checks the firewall accepts for the traffic defined ...
HA Interface Network > Interfaces > Ethernet Each high availability (HA) interface has a specific function: one interface is for configuration synchronization and heartbeats, and ...
Activate Free Licenses for Decryption Features
Activate the free licenses required to get started with Decryption Broker and Decryption Port Mirroring. ...
Log Card Interface
Log Card Interface Network > Interfaces > Ethernet If you configure log forwarding on a PA-7000 Series firewall with a Log Processing Card (LPC), you ...
Objects > Decryption Profile
Objects > Decryption Profile Decryption profiles enable you to block and control specific aspects of SSL and SSH traffic that you have specified for decryption, ...
Tap Interface Network > Interfaces > Ethernet You can use a tap interface to monitor traffic on a port. To configure a tap interface, click ...