Training_03: SSLi L2 Bridge Solution Part 2
Last updated
Last updated
Table of Content
[TOC]
In today's rapidly evolving landscape of network management and security, the Network Traffic Broker (NTB) stands out as a pivotal tool, transforming the way organizations modify their existing networks to incorporate NTB and enhance security systems. SSL inspection, a crucial process for decrypting and inspecting secure traffic, and L2 bridging, a method for transparently passing traffic between network segments, have become indispensable components in today's complex network environments. NTB takes center stage by enabling devices like Intrusion Prevention Systems (IPS), Firewalls, Anti-Virus solutions, and more to seamlessly utilize SSL inspection and L2 bridging capabilities.
This strategic shift not only augments the overall flexibility of network configurations but also empowers organizations to efficiently integrate their existing equipment with new security functions. In this era of heightened cyber threats, mastering the implementation of NTB for SSL inspection and L2 bridge solutions is essential for network professionals seeking to fortify their network's resilience.
Transforming your existing network to incorporate the Network Traffic Broker (NTB) for SSL inspection and L2 bridge solutions is a multifaceted endeavor. In this training guide, we will delve into one of the primary methods of configuring NTB for existing networks and security systems: using the user-friendly Web GUI interface. While NTB can also be configured via the console interface, our focus will be on harnessing the web-based interface to effectively modify your network and integrate enhanced security measures. This guide aims to provide a step-by-step walkthrough, offering valuable insights into the process of configuring the NTB for SSL inspection and L2 bridge solutions through the web-based interface within the context of an existing network. By the end of this tutorial, you will have a solid foundation for seamlessly incorporating NTB into your network infrastructure, thus ensuring efficient SSL inspection and L2 bridging with ease.
To access the Web UI of any NTB model, you can connect to the MGMT port. The default IP address for the NTB is set to 192.168.1.150. When initially accessing the Web UI, you can utilize the default login credentials, where the username is "array," and the password is "admin," as illustrated in Figure 1. Once logged in, you will gain entry to the main page (depicted in Figure 2). From this main page, navigate to the "NTB XML" tab. This section allows users to harness the full capabilities of the NTB by utilizing XML tags for configuration and management.
In this training document, once you access the NTB XML interface, you will encounter file tabs, file action buttons, and file edit windows, as illustrated in Figure 3. Let's explore the functions of each element in detail :
File Tabs: The file tabs display the available files for configuring NTB data task rules. Currently, the system supports two types of files: JavaScript and XML. The active file's tab will be highlighted in white, while the inactive ones will appear in gray. You can also make modifications to the content of these files through the file edit windows .
File Action Buttons: There are five types of action buttons: "Format," "Reset," "Submit," "Save," and "Load."
The "Format" button checks whether the current active file complies with the proper XML format.
Clicking "Reset" reverts the current active file to its last submitted state, discarding any unsaved changes.
The "Submit" button for JavaScript files saves the current status of the JavaScript file. However, when dealing with XML files, clicking "Submit" will adjust the NTB's settings accordingly.
The "Save" and "Load" buttons are used for saving and loading the current XML file to and from disk space.
File Edit Windows: This window is designed for modifying the content of XML or JavaScript files. It's worth noting that its capabilities are somewhat rudimentary, making it less suitable for editing large volumes of content. For more extensive edits, it's recommended to use external software and subsequently copy-paste the revised content into this window for submission .
Element : This should be the first element and encapsulate the entire document. Only elements inside the element will be considered legal use of the XML elements.
Element : This element defines the filter rules to be employed in the XML script. Within this element, you have the option to assign attributes such as 'id' and 'name' to identify the filter for future reference. Additionally, other attributes like 'sessionBase' and 'matchedlog' can be used to control the filter's behavior. Furthermore, there are three types of elements available to establish filter rules: , , and .
Element : This element defines the attribute used to distinguish the desired packet from the rest. Available attributes for selection include, but are not limited to, vlan.id, ip.addr, tcp.port, and more.
Elements and : These two elements define the relationships between different elements. When various elements are enclosed within tags, it will only be necessary to satisfy one condition. In contrast, for , it will be necessary to satisfy all find conditions.
Element : This element defines various actions and packet manipulations that can be performed when an internet packet exits a port. By using the element to specify the exit port, you can then utilize various elements for packet engineering, such as to remove packet information, to add VLAN ID, and many other tags.
Element : This element serves to consolidate all the elements together. It utilizes the element to specify the input port, to identify the filter used, element is used to specify the path a packet is going to take after being filtered, and elements to define the output port and any actions to be taken at the output.
In this training document, the current network layout, as depicted in Figure 4, features a switch, router, firewall, and DDoS protection. We are now introducing new elements, namely an APV and a security device, with the guidance of NTB. The process of integrating or adapting the existing layout to accommodate these new security devices can be complex, potentially requiring the deployment of multiple sets of security devices. This redundancy can lead to unnecessary duplication and inefficiencies within the network.
With the assistance of NTB, the process of integrating the new security devices can become more flexible, minimizing unused capacity and streamlining the network topology. Furthermore, NTB's capability to generate NetFlow data can enhance network monitoring and analysis, providing valuable insights into traffic flows and facilitating more effective network management.
In Case A, our objective is to integrate a new security device into the existing network, utilizing the APV for SSL interception for this newly introduced device, as shown in Figure 5. In this particular case, there are two distinct pathways, A and B, each providing a separate route to the web service. Both pathways share a single APV and a single NTB. The role of the NTB is to exclusively redirect traffic to and from TCP port 443 to the APV, allowing other data to pass through directly, thereby reducing the load on the APV's capacity.
For Path A, the data traffic enters at port 7, exits at port 5 to enter the APV, undergoes inspection by the security device, re-enters the NTB at port 4, and then leaves via port 6 towards the web server.
In Path B, the route involves entry at port 3, exiting at port 0 toward the APV, returning to the NTB from the APV at port 1, and leaving through port 2 towards the web server. Simultaneously, the NTB is capable of generating NetFlow data for both Path A and Path B, facilitating in-depth traffic analysis.
Traffic to/from TCP port 443 requires SSL interception
Path A traffic entering through Port 7 exits via Port 5 to the APV, re-enters through Port 4, and leaves at Port 6 vice versa.
Path B traffic entering through Port 3 exits via Port 0 to the APV, re-enters through Port 1, and leaves at Port 2 vice versa.
Base on above criteria we are create the following element :
After the element was created, we will start create element from client to internet.
Next, we will create the element for traffic from the internet to the client, as illustrated in Figure 8.
The complete XML script .
In Case B, we are working with a network configuration that utilizes the Link Aggregation Control Protocol (LACP) with two ports, as depicted in Figure 9. The process of integrating SSL interception and a security device into this network can be complex. It may require the deployment of additional pairs of devices, potentially leading to an inefficient use of data processing capacity.
By harnessing the capabilities of the Network Traffic Device (NTB), we can design a network topology that provides ample capacity and includes hardware bypass mechanisms to mitigate potential security device malfunctions, which could otherwise disrupt network operations. This approach enhances both the efficiency and reliability of network traffic management, as illustrated in Figure 10.
In this setup, internet service remains available even if the security device experiences an outage. With the new topology depicted in Figure 10, the Network Traffic Broker (NTB) can integrate a security device configured to monitor the network's security via a heartbeat packet signal. When the security device in the network ceases to function, the NTB swiftly redirects network traffic away from the compromised security device, as illustrated in Figure 11.
Furthermore, with NTB's hardware bypass at ports 6 and 7, internet traffic can continue to flow even if the NTB itself is non-operational, as demonstrated in Figure 12.
As depicted in Figure 10, the redirection of network traffic from Port 3 and Port 7 is a crucial step in this configuration. Specifically, HTTPS traffic from both Port 3 and Port 7 is directed to Port 0, where it undergoes processing through the Application Delivery Controller (APV) and the security device. To ensure that the network operates as intended and the functionalities of the APV and security device remain consistent, continuous monitoring is essential. Therefore, a heartbeat packet is sent from Port 0 to Port 1, providing ongoing health checks.
Upon passing through the APV and security device, the traffic must be properly segmented, and the VLAN tag added at Port 7's exit from Port 0 must be removed. This process guarantees the appropriate routing and isolation of network traffic, maintaining the integrity of the network's operation and security measures.
Traffic to/from TCP port 443 undergoes SSL interception.
TCP port 443 traffic from Port 7 exits through Port 0 with the addition of a VLAN tag (10) and then reset traffic before leaving Port 6.
TCP port 443 traffic from Port 3 exits through Port 2, and the resets traffic leaves through Port 6.
Traffic from Port 1, tagged with VLAN 10, has its VLAN tag removed and exits through Port 6.
Traffic from Port 1 without VLAN tag 10 exits through Port 2.
A heartbeat signal is sent from Port 0 to Port 1 for continuous monitoring.
TCP port 443 traffic from Port 6 exits through Port 1 with the addition of a VLAN tag (10), resets, and then leaves through Port 7.
TCP port 443 traffic from Port 2 exits through Port 1, resets, and then leaves through Port 3.
Traffic from Port 0, tagged with VLAN 10, has its VLAN tag removed and exits through Port 7.
Traffic from Port 0 without VLAN tag 10 exits through Port 3.
Base on above criteria we are create the following and element :
After the and element was created, we will start create element from client to internet as illustrate in figure 13.
Next, we will create the element for traffic from the internet to the client, as illustrated in Figure 14.
The complete XML script .
The NTB utilizes XML scripts to establish control over data flow and perform packet engineering. XML files employ various elements to achieve distinct effects on the NTB. A comprehensive list of all XML elements can be found on the website . In this training document, we will specifically introduce the elements that will be utilized.
For comprehensive documentation and detailed guidance on how to utilize each element, as well as explore all available attributes, please refer to .
### Case A Apply Chain Element from client to internet
### Case A Apply Chain Element from internet to client
### Case B Apply Chain Element from client to internet
### Case B Apply Chain Element from internet to client