SSL mirroring support
You can configure your FortiGate-7000E to "mirror" or send a copy of traffic decrypted by SSL inspection to one or more interfaces so that the traffic can be collected by a raw packet capture tool for archiving or analysis.
Decryption, storage, inspection, and use of decrypted content is subject to local privacy rules. Use of these features could enable malicious users with administrative access to your FortiGate to harvest sensitive information submitted using an encrypted channel. |
Use the information in Mirroring SSL traffic in policies to set up SSL mirroring for your FortiGate-7000E.
You can use the following command from an FPM CLI to verify the mirrored traffic:
diagnose sniffer packet <interface> 'port 443' -c 50 interfaces=[1-C1/7] filters=[port 443] pcap_lookupnet: <interface>: no IPv4 address assigned 0.440714 8.1.1.69.18478 -> 9.2.1.130.443: syn 582300852 0.440729 9.2.1.130.443 -> 8.1.1.69.18478: syn 3198605956 ack 582300853 0.440733 8.1.1.69.18478 -> 9.2.1.130.443: ack 3198605957 0.440738 8.1.1.69.18478 -> 9.2.1.130.443: psh 582300853 ack 3198605957 0.441450 9.2.1.130.443 -> 8.1.1.69.18478: psh 3198605957 ack 582301211 0.441535 9.2.1.130.443 -> 8.1.1.69.18478: psh 3198607351 ack 582301211 0.441597 9.2.1.130.443 -> 8.1.1.69.18478: psh 3198608747 ack 582301211 0.441636 9.2.1.130.443 -> 8.1.1.69.18478: psh 3198610143 ack 582301211 0.441664 9.2.1.130.443 -> 8.1.1.69.18478: psh 3198611539 ack 582301211 0.441689 9.2.1.130.443 -> 8.1.1.69.18478: psh 3198612935 ack 582301211 0.441715 9.2.1.130.443 -> 8.1.1.69.18478: psh 3198614331 ack 582301211 0.441739 9.2.1.130.443 -> 8.1.1.69.18478: psh 3198615727 ack 582301211 0.441764 9.2.1.130.443 -> 8.1.1.69.18478: psh 3198617123 ack 582301211