Determine traffic mirroring methods to use

Completed

In the previous unit, you identified the devices and subnets in your automotive manufacturing site to monitor. Now you determine the traffic mirroring methods to use for your site.

Traffic mirroring with Defender for IoT allows you to mirror network traffic to your sensors, where you can monitor and diagnose risks and threats in your network.

Traffic mirroring methods

Determine what traffic mirroring methods to use based on your network configuration. Defender for IoT supports the following traffic mirroring methods:

Method Description
Switch SPAN port Mirrors local traffic from interfaces on the switch to a different interface on the same switch.

Remote SPAN (RSPAN) port Mirrors traffic from multiple, distributed source ports into a dedicated remote virtual local area network (VLAN).

The VLAN data is delivered through trunked ports, across multiple switches to a specified switch containing the physical destination port.

Active or passive aggregation (TAP) Installs an active/passive aggregation terminal access point (TAP) inline to your network cable. The TAP duplicates Receive and Transmit traffic to the OT network sensor.

The TAP hardware device allows network traffic to flow between ports without interruption and without compromising network integrity.

The advantages of TAPs include that they're hardware based, pass all messages, including damaged ones, and aren't processor-sensitive.

TAPs are recommended for forensic monitoring.

Encapsulated remote switched port analyzer (ERSPAN) Secures remote networks by mirroring input interfaces over an IP network to your OT sensor's monitoring promiscuous interface. Traffic payloads are encapsulated by generic routing encapsulation (GRE) tunnel encapsulation and are analyzed by the sensor.

ERSPAN is good for when traffic needs to be routed across OSI Layer 3 networks. It can include sources like ethernet ports, VLANs, fabric port channels, and satellite ports.

ESXi vSwitch Uses a virtual switch and Promiscuous mode as a workaround for configuring a monitoring port, since virtual switches don't have mirroring capabilities.

Any traffic that goes through the virtual switch is visible to other network interfaces in the same port group.

Hyper-V vSwitch Uses a virtual switch and Promiscuous mode as a workaround for configuring a monitoring port, since virtual switches don't have mirroring capabilities.

Any traffic that goes through the virtual switch is visible to other network interfaces in the same port group.

Choose your monitoring method based on considerations like your overall monitoring needs, network configuration, sensor connection, and available resources.

Example scenarios

The following examples visual possible traffic mirroring methods that you might choose to use in your car manufacturing organization based on your network configuration:

Remote VLAN architecture

In the following example of a Remote VLAN architecture, your source switches are configured with remote SPAN sessions, which distribute the data via intermediate switches to the destination switch. The destination switch monitors traffic from your OT network sensor with Defender for IoT:

Diagram of a remote VLAN architecture.

Active or passive aggregation (TAP)

In the following example of a network TAP architecture the TAP is installed inline to the network cable and mirrors traffic to Defender for IoT:

Diagram of a network TAP.

ERSPAN architecture

In the following example of an ERSPAN architecture, the source router encapsulates traffic and sends the packet over the OSI layer 3 network to the destination router. Then decapsulates and sends it to the OT network sensor and on to Defender for IoT:

Diagram of an ERSPAN network.

Prevent undetected port connections

To prevent rogue devices from connecting undetected to an unmonitored port, configure traffic mirroring from all of your switch's ports. For OT networks that use broadcast or multicast messaging, configure traffic mirroring only for RX (Receive) transmissions to prevent unnecessary bandwidth use.

Knowledge check

1.

What factors should you consider when choosing a traffic mirroring method for each sensor?

2.

Your automotive manufacturing organization wants forensic traffic monitoring to protect in-vehicle software and firmware during manufacturing. What traffic mirroring method would be ideal for your use?