I am building a lab inside QubesOS. I have two gateways, two firewalls. Behind the pentest-firewall I want all machines to see each other. Since I have both Win and Linux machines and for simplicity's sake I am doing this from the firewall.
On top of this I have a Security Onion running to capture all traffic internal to internal and internal to external. I have PolarProxy installed on it to decrypt HTTPS traffic (https://www.netresec.com/?page=Blog&month=2020-01&post=Sniffing-Decrypted-TLS-Traffic-with-Security-Onion) This rule opens up all internal communication on the pentest-firewall: iptables -I FORWARD -i vif+ -o vif+ -j ACCEPT These rules should forward all HTTPS to the Security Onion: iptables -A FORWARD -i eth0 -d 10.137.0.24 -p tcp --dport 10443 -m state --state NEW -j ACCEPT iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 443 -j DNAT --to 10.137.0.24:10443 iptables -t nat -A POSTROUTING -o eth0 -d 10.137.0.24 -p tcp --dport 10443 -j MASQUERADE Important IPs/Details: SecurityOnion 10.137.0.24 Security Onion interface eth0 Firewall IP: 10.137.0.6 QUESTION How can I set up full traffic mirroring to that Security Onion machine? It's easy with a physical switch but I cannot make it work with iptables. Please help. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/78x2nonu3gggbCdEbEiYRDG03EeDX0TS7Uhd9wSTMo_FAf3wjmjIfP6i4Q8sKu5EmRxoKE-FsaLckb0zt_eOQGrtfC-ASPdg3r1hi8Oyepo%3D%40protonmail.com.
publickey - letmereadit@protonmail.com - 0xEE010E73.asc
Description: application/pgp-keys
signature.asc
Description: OpenPGP digital signature