SSL mirroring allows the FortiGate to decrypt and mirror traffic to a designated port. A new decrypted traffic mirror profile can be applied to IPv4, IPv6, and explicit proxy firewall policies in both flow and proxy mode. Full SSL inspection must be used in the policy for the traffic mirroring to occur.
SSL inspection is automatically enabled when you enable a security profile on the policy configuration page.
- Go to Policy & Objects > Firewall Policy.
- Create a new policy, or edit an existing one.
- Configure the interfaces, sources, and other required information.
- In the Security Profiles section, for SSL Inspection, select deep-inspection, or another profile that uses Full SSL Inspection.
- Click Agree to accept the terms.
- In the drop-down list, select a decrypted traffic mirror, or click Create to create a new one.
In this example, a new decrypted traffic mirror is created using the port3 interface.
- Click OK to save the policy.
- Create the decrypted traffic mirror profile:
config firewall decrypted-traffic-mirror edit SSL-to-port3 set dstmac ff:ff:ff:ff:ff:ff set traffic-type ssl set traffic-source client set interface port3 next end
- Configure the policy to enable SSL traffic mirroring:
config firewall policy edit 1 set name "mirror-policy" set srcintf "port1" set dstintf "port2" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ALL" set nat enable set ssl-ssh-profile "deep-inspection" set decrypted-traffic-mirror "SSL-to-port3" THIS IS A LEGALLY BINDING AGREEMENT BETWEEN YOU, THE USER AND ITS ORGANIZATION ("CUSTOMER"), AND FORTINET. BEFORE YOU CONTINUE WITH THE TERMS AND CONDITIONS OF THIS CONTRACT (THE "FEATURE ENABLEMENT") CAREFULLY READ THE TERMS AND CONDITIONS OF THIS AGREEMENT. BY ENTERING YES, YOU, AS AN AUTHORIZED REPRESENTATIVE ON BEHALF OF CUSTOMER, CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT ("AGREEMENT") AND YOU REPRESENT THAT YOU HAVE READ AND UNDERSTAND THIS AGREEMENT AND HAVE HAD SUFFICIENT OPPORTUNITY TO CONSULT WITH COUNSEL, PRIOR TO AGREEING TO THE TERMS HEREIN AND ENABLING THIS FEATURE. IF YOU HAVE ANY QUESTIONS OR CONCERNS, OR DESIRE TO SUGGEST ANY MODIFICATIONS TO THIS AGREEMENT, PLEASE CONTACT YOUR FORTINET SUPPORT REPRESENTATIVE TO BE REFERRED TO FORTINET LEGAL. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, DO NOT CONTINUE WITH THE ACCEPTANCE PROCESS. BY ACCEPTING THE TERMS AND CONDITIONS HEREIN, CUSTOMER HEREBY AGREES THAT: 1. Customer represents and warrants that Customer, not Fortinet, is engaging this feature. 2. Customer represents and warrants that Customer has provided the requisite notice(s) and obtained the required consent(s) to utilize this feature. 3. Customer represents and warrants that Customer will only access data as necessary in a good faith manner to detect malicious traffic and will put in place processes and controls to ensure this occurs. 4. Customer represents and warrants that Customer has the right to enable