Fortinet black logo

Administration Guide

Decrypted Traffic Mirror

Decrypted Traffic Mirror

SSL mirroring allows the FortiProxy unit to decrypt and mirror traffic to a designated port. A decrypted traffic mirror profile can be applied to explicit, transparent, SSH tunnel, and SSH proxy policies when the custom-deep-inspection, deep-inspection, or deep-test SSL/SSH inspection security profile is selected.

SSL inspection is automatically enabled when you enable a security profile on the policy configuration page.

To see a list of available decrypted traffic mirror profiles in the GUI, go to Policy & Objects > Decrypted Traffic Mirror.

Hover over the leftmost edge of the column heading to display the Configure Table icon, which you can use to select the columns to display or to reset all the columns to their default settings. You can also drag column headings to change their order.

The following options are available:

Create New

Select to open the Create Decrypted Traffic Mirror window. See Create or edit a decrypted traffic mirror profile.

Edit

Edit the selected decrypted traffic mirror profile. See Create or edit a decrypted traffic mirror profile.

Clone

Copy an existing decrypted traffic mirror profile.

Delete

Delete the selected decrypted traffic mirror profile.

Search

Enter a search term to find in the list.

Name

The name of the decrypted traffic mirror profile.

Destination MAC

The destination MAC address for the mirrored traffic.

Decrypted Traffic Type

Whether decrypted SSL traffic, decrypted SSH traffic, or both are mirrored.

Decrypted Traffic source

Whether decrypted client-side traffic, decrypted server-side traffic, or both are mirrored.

Interfaces

The interfaces for decrypted traffic to be mirrored.

Ref.

Displays the number of times the object is referenced to other objects.

To view the location of the referenced object, select the number in Ref., and the Object Usage window appears displaying the various locations of the referenced object.

Decrypted Traffic Mirror

SSL mirroring allows the FortiProxy unit to decrypt and mirror traffic to a designated port. A decrypted traffic mirror profile can be applied to explicit, transparent, SSH tunnel, and SSH proxy policies when the custom-deep-inspection, deep-inspection, or deep-test SSL/SSH inspection security profile is selected.

SSL inspection is automatically enabled when you enable a security profile on the policy configuration page.

To see a list of available decrypted traffic mirror profiles in the GUI, go to Policy & Objects > Decrypted Traffic Mirror.

Hover over the leftmost edge of the column heading to display the Configure Table icon, which you can use to select the columns to display or to reset all the columns to their default settings. You can also drag column headings to change their order.

The following options are available:

Create New

Select to open the Create Decrypted Traffic Mirror window. See Create or edit a decrypted traffic mirror profile.

Edit

Edit the selected decrypted traffic mirror profile. See Create or edit a decrypted traffic mirror profile.

Clone

Copy an existing decrypted traffic mirror profile.

Delete

Delete the selected decrypted traffic mirror profile.

Search

Enter a search term to find in the list.

Name

The name of the decrypted traffic mirror profile.

Destination MAC

The destination MAC address for the mirrored traffic.

Decrypted Traffic Type

Whether decrypted SSL traffic, decrypted SSH traffic, or both are mirrored.

Decrypted Traffic source

Whether decrypted client-side traffic, decrypted server-side traffic, or both are mirrored.

Interfaces

The interfaces for decrypted traffic to be mirrored.

Ref.

Displays the number of times the object is referenced to other objects.

To view the location of the referenced object, select the number in Ref., and the Object Usage window appears displaying the various locations of the referenced object.