Configuring Packet Mirroring

Description

Configuring Packet Mirroring

Firmware/Software Version: SonicOS Enhanced 5.6.x and above
Services: Packet Mirroring

Resolution for SonicOS 7.X

This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.

Feature/Application:

Packet mirroring is the process of sending a copy of packets seen on one interface to another interface or to a remote SonicWall appliance. This KB article describes how to configure Packet Mirroring either locally or between two SonicWall UTM appliances.

Procedure:

Remote Mirroring

This section describes how to configure Packet Mirroring between two SonicWall UTM appliances with the following configuration:

TZ 570
X1 (WAN) Interface IP: 172.27.61.115

NSA 4500
X1 (WAN) Interface IP: 192.168.170.51


The requirement is to send packets from the TZ 570 to the NSA 4500.

  • Login to the TZ 570 SonicWall management GUI
  • Navigate to the Monitor | Tools and Monitor | Packet Monitor | General | Mirror page.
  • Click on it to open the Packet Monitor Configuration window.
  • Click on the Mirror tab.
  • Under Remote Mirror Settings (Sender), Mirror filtered packets to remote SonicWall firewall (IP Address) enter the X1 (WAN) interface IP of the remote NSA 4500. In a Site-to-Site VPN between these devices, the IP address could be the LAN interface IP.
  • Click on OK to save the settings.
  • Click on the Start Mirror button on the Packet Monitor page.
    Image


    Image
  • Rest configuration has to be done on the NSA 4500 firewall to receive the packets sent by the TZ 570 to the NSA 4500.
    NOTE: The process to configure the NSA 4500 is explained in the below section.

Resolution for SonicOS 6.5

This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.

Procedure:

Remote Mirroring

This section describes how to configure Packet Mirroring between two SonicWall UTM appliances with the following configuration:

TZ 210
X1 (WAN) Interface IP: 172.27.61.115

NSA 4500
X1 (WAN) Interface IP: 192.168.170.51


The requirement is to send packets from the TZ 210 to the NSA 4500.

  • Login to the TZ 210 SonicWall management GUI
  • Navigate to the System > Packet Monitor page.
  • Click on Configure to open the Packet Monitor Configuration window.
  • Click on the Mirror tab.
  • Under Remote Mirror Settings (Sender) > Mirror filtered packets to remote SonicWall firewall (IP Address) enter the X1 (WAN) interface IP of the remote NSA 4500. In a Site-to-Site VPN between these devices, the IP address could be the LAN interface IP.
  • Click on OK to save the settings.
  • Click on the Start Mirror button on the Packet Monitor page.
Image
 
Image
  • Login to the NSA 4500 SonicWall management GUI
  • Navigate to the System > Packet Monitor page.
  • Click on Configure to open the Packet Monitor Configuration window.
  • Click on the Mirror tab.
  • Under Remote Mirror Settings (Receiver) > Receive mirrored packets from remote SonicWall firewall (IP Address) enter the X1 (WAN) Interface IP of the remote NSA TZ 210. In a Site-to-Site VPN between these devices the IP address could be the LAN interface IP. This is supported in NSA platforms only.
  • Click on OK to save the settings.
  • Click on the Start Mirror button on the Packet Monitor page.
Image
Image

With the above configuration, if a capture device is connected directly to the X0 of the receiving SonicWall, all traffic flowing through the sending SonicWall can be captured. Here is a Wireshark capture of packets being received in the PC connected to the X0 of the receiving SonicWall:
 
Image

Local Mirroring

Local Mirroring is useful for sending packets reaching a SonicWall to another interface of the same SonicWall. This includes remotely mirrored packets from a remote SonicWall. This is supported in NSA platforms only.
 
Image
  • To save received packets in the local capture buffer, select the Send received remote mirrored packets to capture buffer checkbox. This option is independent of sending received packets to another interface, and both can be enabled if desired.
With the above configuration, if a capture device is connected directly to the X2,  all traffic flowing through the SonicWall can be captured. This includes remotely mirrored packets from a remote SonicWall

Related Articles

  • TOTP based two-factor authentication for management by Admin user using SonicOS API
    Read More
  • Two-factor authentication using TOTP for Management by User with admin privileges
    Read More
  • How do I configure Two-factor authentication for the Admin login with TOTP?
    Read More
not finding your answers?
was this article helpful?