Using a Switch as Port Extender for Threat Defender

Using a VLAN-capable switch as port extender, you can connect Threat Defender to your LAN and intercept the network traffic, i.e. apply policies to the traffic.

This approach differs from setting up a mirror port where Threat Defender only sees copies of the packets but cannot intercept them.

1. On the Switch

  1. Assign VLAN tags 301-348 to each port of the switch. We recommend mapping VLAN tag 301 to port 1 and so on. Refer to the documentation of your switch for further information.
  2. Set up one port as trunk port that contains all tagged VLANs.
  3. Connect the trunk port of the switch to Threat Defender. In this example, we connect the trunk port to interface enp4s0.

With this setup, the switch cannot transmit any other VLAN-tagged traffic.

2. On cognitix Threat Defender

  1. Navigate to Network > Manage Processing Interfaces.
  2. In the table, find the interface connected to the trunk port of the switch, i.e. enp4s0. Click its icon.
  3. Enter the used VLAN range, i.e. 301-348.
  4. Save the bridge.

    Port extender interface
    Fig. 1: Example interface setup.
  5. Disable the default interface configuration, i.e. set the slider switch to .

  6. Click the APPLY CHANGES button in the header to activate your configuration changes.

3. Result

All the physical ports of the switch are now bridged via their VLANs on the selected interface. Threat Defender can now intercept the communication going through the switch via the assigned VLAN tags.

results matching ""

    No results matching ""