Using a Switch as Port Extender for Threat Defender
This approach differs from setting up a mirror port where Threat Defender only sees copies of the packets but cannot intercept them.
1. On the Switch
- Assign VLAN tags 301-348 to each port of the switch. We recommend mapping VLAN tag 301 to port 1 and so on. Refer to the documentation of your switch for further information.
- Set up one port as trunk port that contains all tagged VLANs.
- Connect the trunk port of the switch to Threat Defender. In this example, we connect the trunk port to interface
With this setup, the switch cannot transmit any other VLAN-tagged traffic.
2. On cognitix Threat Defender
- Navigate to Network > Manage Processing Interfaces.
- In the table, find the interface connected to the trunk port of the switch, i.e.
enp4s0. Click its icon.
- Enter the used VLAN range, i.e.
Save the bridge.
Disable the default interface configuration, i.e. set the slider switch to .
- Click the APPLY CHANGES button in the header to activate your configuration changes.
All the physical ports of the switch are now bridged via their VLANs on the selected interface. Threat Defender can now intercept the communication going through the switch via the assigned VLAN tags.