Si applica a: Advanced Threat Analytics versione 1.8Applies to: Advanced Threat Analytics version 1.8

Convalidare il mirroring delle porteValidate Port Mirroring


Questo articolo si riferisce solo alla distribuzione di gateway ATA al posto di gateway ATA Lightweight.This article is relevant only if you deploy ATA Gateways instead of ATA Lightweight Gateways. Per stabilire se è necessario usare i gateway ATA, vedere Scelta del tipo di gateway corretto per la distribuzione.To determine if you need to use ATA Gateways, see Choosing the right gateways for your deployment.

I passaggi seguenti consentono di eseguire il processo di convalida della corretta configurazione del mirroring delle porte.The following steps walk you through the process for validating that port mirroring is properly configured. Per il corretto funzionamento di ATA, il gateway ATA deve poter vedere il traffico da e verso il controller di dominio.For ATA to work properly, the ATA Gateway must be able to see the traffic to and from the domain controller. L'origine dati principale usata da ATA è un'analisi approfondita dei pacchetti del traffico di rete da e verso i controller di dominio.The main data source used by ATA is deep packet inspection of the network traffic to and from your domain controllers. Per consentire ad ATA di vedere il traffico di rete, è necessario configurare il mirroring delle porte.For ATA to see the network traffic, port mirroring needs to be configured. Il mirroring delle porte copia il traffico da una porta (la porta di origine) a un'altra porta (la porta di destinazione).Port mirroring copies the traffic from one port (the source port) to another port (the destination port).

Convalidare il mirroring delle porte tramite uno script Windows PowerShellValidate port mirroring using a Windows PowerShell script

  1. Salvare il testo dello script in un file denominato ATAdiag.ps1.Save the text of this script into a file called ATAdiag.ps1.
  2. Eseguire lo script nel gateway ATA che si vuole convalidare.Run this script on the ATA Gateway that you want to validate. Lo script genera traffico ICMP dal gateway ATA al controller di dominio e cerca il traffico nella scheda di interfaccia di rete per l'acquisizione nel controller di dominio.The script generates ICMP traffic from the ATA Gateway to the domain controller and looks for that traffic on the Capture NIC on the domain controller. Se il gateway ATA vede il traffico ICMP con un indirizzo IP di destinazione uguale all'indirizzo IP di controller di dominio immesso nella Console ATA, considera configurato il mirroring delle porte.If the ATA Gateway sees ICMP traffic with a destination IP address the same as the DC IP addressed you entered in the ATA Console, it deems port mirroring configured.

Esempio di esecuzione dello script:Sample for how to run the script:

# ATAdiag.ps1 -CaptureIP n.n.n.n -DCIP n.n.n.n -TestCount n

param([parameter(Mandatory=$true)][string]$CaptureIP, [parameter(Mandatory=$true)][string]$DCIP, [int]$PingCount = 10)

# Set variables

    $ErrorActionPreference = "stop"
$starttime = get-date
$byteIn = new-object byte[] 4
$byteOut = new-object byte[] 4
$byteData = new-object byte[] 4096  # size of data

$byteIn[0] = 1  # for promiscuous mode
$byteIn[1-3] = 0
$byteOut[0-3] = 0

# Convert network data to host format
    function NetworkToHostUInt16 ($value)

function NetworkToHostUInt32 ($value)

function ByteToString ($value)
    $AsciiEncoding = new-object system.text.asciiencoding

Write-Host "Testing Port Mirroring..." -ForegroundColor Yellow
Write-Host ""
Write-Host "Here is a summary of the connection we will test." -ForegroundColor Yellow

# Initialize a first ping connection
Test-Connection -Count 1 -ComputerName $DCIP -ea SilentlyContinue
Write-Host ""

Write-Host "Press any key to continue..." -ForegroundColor Red
Write-Host ""
Write-Host "Sending ICMP and Capturing data..." -ForegroundColor Yellow

# Open a socket

$socket = new-object[Net.Sockets.AddressFamily]::InterNetwork,[Net.Sockets.SocketType]::Raw,[Net.Sockets.ProtocolType]::IP)

# Include the IP header

$socket.ReceiveBufferSize = 10000

$ipendpoint = new-object[net.ipaddress]"$CaptureIP",0)

# Enable promiscuous mode

# Initialize test variables
$tests = 0
$TestResult = "Noise"
$OneSuccess = 0

while ($tests -le $PingCount)
    if (!$socket.Available)  # see if any packets are in the queue
        start-sleep -milliseconds 500

# Capture traffic
    $rcv = $socket.receive($byteData,0,$byteData.length,[net.sockets.socketflags]::None)

# Decode the header so we can read ICMP

    $MemoryStream = new-object System.IO.MemoryStream($byteData,0,$rcv)
    $BinaryReader = new-object System.IO.BinaryReader($MemoryStream)

# Set IP version & header length
    $VersionAndHeaderLength = $BinaryReader.ReadByte()

    # TOS
    $TypeOfService= $BinaryReader.ReadByte()

    # More values, and the Protocol Number for ICMP traffic
    # Convert network format of big-endian to host format of little-endian 
    $TotalLength = NetworkToHostUInt16 $BinaryReader.ReadBytes(2)

    $Identification = NetworkToHostUInt16 $BinaryReader.ReadBytes(2)
    $FlagsAndOffset = NetworkToHostUInt16 $BinaryReader.ReadBytes(2)
    $TTL = $BinaryReader.ReadByte()
    $ProtocolNumber = $BinaryReader.ReadByte()
    $Checksum = [Net.IPAddress]::NetworkToHostOrder($BinaryReader.ReadInt16())

    # The source and destination IP addresses
    $SourceIPAddress = $BinaryReader.ReadUInt32()
    $DestinationIPAddress = $BinaryReader.ReadUInt32()

    # The source and destimation ports
    $sourcePort = [uint16]0
    $destPort = [uint16]0

    # Close the stream reader

    # Cast DCIP into an IPaddress type
    $DCIPP = [ipaddress] $DCIP
    $DestinationIPAddressP = [ipaddress] $DestinationIPAddress

    #Ping the DC at the end after starting the capture
    Test-Connection -Count 1 -ComputerName $DCIP -ea SilentlyContinue | Out-Null

    # This is the match logic - check to see if Destination IP from the Ping sent matches the DCIP entered by in the ATA Console  
    # The only way the ATA Gateway should see a destination of the DC is if Port Spanning is configured

        if ($DestinationIPAddressP -eq $DCIPP)  # is the destination IP eq to the DC IP? 
        $TestResult = "Port Spanning success!"
        $OneSuccess = 1
        } else {
            $TestResult = "Noise"

    # Put source, destination, test result in Powershell object

    new-object psobject | add-member -pass noteproperty CaptureSource $([]$SourceIPAddress) | add-member -pass noteproperty CaptureDestination $([]$DestinationIPAddress) | Add-Member -pass NoteProperty Result $TestResult | Format-List | Out-Host
    #Count tests
    $tests ++

    If ($OneSuccess -eq 1){
        Write-Host "Port Spanning Success!" -ForegroundColor Green
        Write-Host ""
        Write-Host "At least one packet which was addressed to the DC, was picked up by the Gateway." -ForegroundColor Yellow
        Write-Host "A little noise is OK, but if you don't see a majority of successes, you might want to re-run." -ForegroundColor Yellow
    } Else {
        Write-Host "No joy, all noise.  You may want to re-run, increase the number of Ping Counts, or check your config." -ForegroundColor Red

Write-Host ""
Write-Host "Press any key to continue..." -ForegroundColor Red

Convalidare il mirroring delle porte tramite Net MonValidate port mirroring using Net Mon

  1. Installare Microsoft Network Monitor 3.4 nel gateway ATA che si vuole convalidare.Install Microsoft Network Monitor 3.4 on the ATA Gateway that you want to validate..


    Non installare Microsoft Message Analyzer o altri software di acquisizione del traffico nel gateway ATA.Do not install Microsoft Message Analyzer, or any other traffic capture software on the ATA Gateway.

  2. Aprire Network Monitor e creare una nuova scheda di acquisizione.Open Network Monitor and create a new capture tab.

    1. Selezionare solo la scheda di rete di acquisizione o la scheda di rete connessa alla porta di commutazione configurata come destinazione del mirroring delle porte.Select only the Capture network adapter or the network adapter that is connected to the switch port that is configured as the port mirroring destination.

    2. Assicurarsi che l'opzione P-Mode sia abilitata.Ensure that P-Mode is enabled.

    3. Fare clic su New Capture.Click New Capture.

      Immagine delle creazione di una nuova scheda di acquisizione

  3. Nella finestra Display Filter immettere il filtro seguente: KerberosV5 OR LDAP e quindi fare clic su Apply.In the Display Filter window, enter the following filter: KerberosV5 OR LDAP and then click Apply.

    Immagine dell'applicazione del filtro Apply KerberosV5 or LDAP

  4. Fare clic su Start per avviare la sessione di acquisizione.Click Start to start the capture session. Se il traffico da e verso il controller di dominio non viene visualizzato, esaminare la configurazione del mirroring delle porte.If you do not see traffic to and from the domain controller, review your port mirroring configuration.

    Immagine dell'avvio della sessione di acquisizione


    È importante assicurarsi che sia possibile visualizzare il traffico da e verso i controller di dominio.It is important to make sure you see traffic to and from the domain controllers.

  5. Se viene visualizzato solo il traffico in una direzione, collaborare con i team che si occupano della virtualizzazione o della rete per risolvere i problemi di configurazione del mirroring delle porte.If you only see traffic in one direction, you should work with your networking or virtualization teams to help troubleshoot your port mirroring configuration.

Vedere ancheSee Also