{"id":1241,"date":"2026-01-23T16:59:09","date_gmt":"2026-01-23T21:59:09","guid":{"rendered":"https:\/\/pressbooks.bccampus.ca\/paloalto\/?post_type=chapter&#038;p=1241"},"modified":"2026-02-19T15:36:04","modified_gmt":"2026-02-19T20:36:04","slug":"2-4-tap-interface-and-capture-traffic","status":"publish","type":"chapter","link":"https:\/\/pressbooks.bccampus.ca\/paloalto\/chapter\/2-4-tap-interface-and-capture-traffic\/","title":{"raw":"2.4 Tap Interface and Captured Traffic","rendered":"2.4 Tap Interface and Captured Traffic"},"content":{"raw":"<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Learning Objectives<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul>\r\n \t<li style=\"font-weight: 400\">Identify Tap Interface<\/li>\r\n \t<li style=\"font-weight: 400\">Configure Tap Interface<\/li>\r\n \t<li style=\"font-weight: 400\">Capture the Traffic under TAP interface<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n\r\n[caption id=\"attachment_1242\" align=\"aligncenter\" width=\"822\"]<img class=\"wp-image-1242 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-135015.png\" alt=\"\" width=\"822\" height=\"345\" \/> Figure 2.55: Main scenario[\/caption]\r\n\r\n<div align=\"left\">\r\n<table style=\"height: 178px;width: 100%\"><caption>Table 2.12: Devices IP address<\/caption>\r\n<tbody>\r\n<tr style=\"height: 18px\">\r\n<td style=\"height: 18px;width: 628.938px\"><strong>Device<\/strong><\/td>\r\n<td style=\"height: 18px;width: 348.375px\"><strong>Configuration<\/strong><\/td>\r\n<\/tr>\r\n<tr style=\"height: 53px\">\r\n<td style=\"height: 53px;width: 628.938px\">Palo Alto<\/td>\r\n<td style=\"height: 53px;width: 348.375px\">Ethernet 1\/1: TAP\r\n\r\nManagement: 192.168.1.1\/24<\/td>\r\n<\/tr>\r\n<tr style=\"height: 18px\">\r\n<td style=\"height: 18px;width: 628.938px\">MGM<\/td>\r\n<td style=\"height: 18px;width: 348.375px\">192.168.1.1\/24<\/td>\r\n<\/tr>\r\n<tr style=\"height: 18px\">\r\n<td style=\"height: 18px;width: 628.938px\">Kali-1<\/td>\r\n<td style=\"height: 18px;width: 348.375px\">192.168.10.1\/24, GW: 192.168.10.3<\/td>\r\n<\/tr>\r\n<tr style=\"height: 18px\">\r\n<td style=\"height: 18px;width: 628.938px\">Kali-2<\/td>\r\n<td style=\"height: 18px;width: 348.375px\">192.168.10.2\/24, GW: 192.168.10.3<\/td>\r\n<\/tr>\r\n<tr style=\"height: 53px\">\r\n<td style=\"height: 53px;width: 628.938px\">Switch<\/td>\r\n<td style=\"height: 53px;width: 348.375px\">Gi 1\/1 and Gi 1\/2 source monitor\r\n\r\nGi1\/3 destination monitor<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<h2>Zones<\/h2>\r\n<div align=\"left\">\r\n<table style=\"width: 100%\"><caption>Table 2.13: Zones<\/caption>\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 459px\"><strong>Parameters<\/strong><\/td>\r\n<td style=\"width: 337px\"><strong>Value<\/strong><\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 459px\">TAP<\/td>\r\n<td style=\"width: 337px\">Ethernet 1 \/1<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/div>\r\n&nbsp;\r\n<h2>What is the TAP interface?<\/h2>\r\nA network tap is a mechanism that allows visibility into data traversing a computer network. In a tap mode deployment, traffic is passively observed using a switch SPAN or mirror port, which copies network traffic without impacting normal data flow. By configuring a dedicated firewall interface in tap mode and connecting it to a switch SPAN port, the firewall receives a mirrored copy of the traffic for analysis. This approach enables application-level visibility across the network while keeping the firewall out of the direct traffic path.\r\n\r\nDeploying a firewall in tap mode allows organizations to gain insight into the applications and potential threats present on the network without modifying the existing network architecture. While the firewall can detect and identify security threats in this mode, it cannot enforce security actions\u2014such as blocking malicious traffic or applying QoS policies\u2014because the traffic does not pass directly through the firewall.\r\n<h2>Cisco Switch Configuration<\/h2>\r\n<\/div>\r\n<div class=\"textbox\">\r\n<pre>(conf t) # int vlan 1\r\n         #ip address 192.168.10.3 255.255.255.0\r\n(conf t) #monitor session 1 source interface gi1\/1\r\n(conf t) #monitor session 1 source interface gi 1\/2\r\n(conf t) #monitor session 1 destination interface gi1\/3<\/pre>\r\n<\/div>\r\nGo to <strong>Monitor &gt; Packet Capture &gt; Configure Capturing<\/strong>. Enable this item and Add Stage Packet Capture\r\n\r\n[caption id=\"attachment_1246\" align=\"aligncenter\" width=\"1014\"]<img class=\"wp-image-1246 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140501.png\" alt=\"\" width=\"1014\" height=\"555\" \/> Figure 2.56: Packet Capture Stage[\/caption]\r\n\r\n[caption id=\"attachment_1244\" align=\"aligncenter\" width=\"1012\"]<img class=\"wp-image-1244 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140128.png\" alt=\"\" width=\"1012\" height=\"573\" \/> Figure 2.57: Captured Files[\/caption]\r\n\r\nAll Palo Alto Networks firewalls have a built-in packet capture (pcap) feature you can use to capture packets that traverse the network interfaces on the firewall. You can then use the captured data for troubleshooting purposes or to create custom application signatures.\r\n\r\nNow, ping from Kali1 to Kali2 again and check the file created in the previous step. Click on the traffic to download in Kali and you are able to open it in Wireshark. Open the file in the Wireshark and verify you have received ICMP Packets.\r\n\r\n[caption id=\"attachment_1248\" align=\"aligncenter\" width=\"752\"]<img class=\"wp-image-1248 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140835.png\" alt=\"\" width=\"752\" height=\"573\" \/> Figure 2.58: Wireshark ICMP Packets[\/caption]\r\n\r\n&nbsp;\r\n\r\nSSH from Kali1 to Kali 2. Capture the traffic and verify you have received SSH Packets in the Wireshark.\r\n\r\n[caption id=\"attachment_1256\" align=\"aligncenter\" width=\"754\"]<img class=\"wp-image-1256 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-141906.png\" alt=\"\" width=\"754\" height=\"651\" \/> Figure 2.59: Wireshark SSHv2 packets[\/caption]","rendered":"<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li style=\"font-weight: 400\">Identify Tap Interface<\/li>\n<li style=\"font-weight: 400\">Configure Tap Interface<\/li>\n<li style=\"font-weight: 400\">Capture the Traffic under TAP interface<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<figure id=\"attachment_1242\" aria-describedby=\"caption-attachment-1242\" style=\"width: 822px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1242 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-135015.png\" alt=\"\" width=\"822\" height=\"345\" srcset=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-135015.png 822w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-135015-300x126.png 300w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-135015-768x322.png 768w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-135015-65x27.png 65w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-135015-225x94.png 225w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-135015-350x147.png 350w\" sizes=\"auto, (max-width: 822px) 100vw, 822px\" \/><figcaption id=\"caption-attachment-1242\" class=\"wp-caption-text\">Figure 2.55: Main scenario<\/figcaption><\/figure>\n<div style=\"text-align: left;\">\n<table style=\"height: 178px;width: 100%\">\n<caption>Table 2.12: Devices IP address<\/caption>\n<tbody>\n<tr style=\"height: 18px\">\n<td style=\"height: 18px;width: 628.938px\"><strong>Device<\/strong><\/td>\n<td style=\"height: 18px;width: 348.375px\"><strong>Configuration<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 53px\">\n<td style=\"height: 53px;width: 628.938px\">Palo Alto<\/td>\n<td style=\"height: 53px;width: 348.375px\">Ethernet 1\/1: TAP<\/p>\n<p>Management: 192.168.1.1\/24<\/td>\n<\/tr>\n<tr style=\"height: 18px\">\n<td style=\"height: 18px;width: 628.938px\">MGM<\/td>\n<td style=\"height: 18px;width: 348.375px\">192.168.1.1\/24<\/td>\n<\/tr>\n<tr style=\"height: 18px\">\n<td style=\"height: 18px;width: 628.938px\">Kali-1<\/td>\n<td style=\"height: 18px;width: 348.375px\">192.168.10.1\/24, GW: 192.168.10.3<\/td>\n<\/tr>\n<tr style=\"height: 18px\">\n<td style=\"height: 18px;width: 628.938px\">Kali-2<\/td>\n<td style=\"height: 18px;width: 348.375px\">192.168.10.2\/24, GW: 192.168.10.3<\/td>\n<\/tr>\n<tr style=\"height: 53px\">\n<td style=\"height: 53px;width: 628.938px\">Switch<\/td>\n<td style=\"height: 53px;width: 348.375px\">Gi 1\/1 and Gi 1\/2 source monitor<\/p>\n<p>Gi1\/3 destination monitor<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Zones<\/h2>\n<div style=\"text-align: left;\">\n<table style=\"width: 100%\">\n<caption>Table 2.13: Zones<\/caption>\n<tbody>\n<tr>\n<td style=\"width: 459px\"><strong>Parameters<\/strong><\/td>\n<td style=\"width: 337px\"><strong>Value<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 459px\">TAP<\/td>\n<td style=\"width: 337px\">Ethernet 1 \/1<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>&nbsp;<\/p>\n<h2>What is the TAP interface?<\/h2>\n<p>A network tap is a mechanism that allows visibility into data traversing a computer network. In a tap mode deployment, traffic is passively observed using a switch SPAN or mirror port, which copies network traffic without impacting normal data flow. By configuring a dedicated firewall interface in tap mode and connecting it to a switch SPAN port, the firewall receives a mirrored copy of the traffic for analysis. This approach enables application-level visibility across the network while keeping the firewall out of the direct traffic path.<\/p>\n<p>Deploying a firewall in tap mode allows organizations to gain insight into the applications and potential threats present on the network without modifying the existing network architecture. While the firewall can detect and identify security threats in this mode, it cannot enforce security actions\u2014such as blocking malicious traffic or applying QoS policies\u2014because the traffic does not pass directly through the firewall.<\/p>\n<h2>Cisco Switch Configuration<\/h2>\n<\/div>\n<div class=\"textbox\">\n<pre>(conf t) # int vlan 1\r\n         #ip address 192.168.10.3 255.255.255.0\r\n(conf t) #monitor session 1 source interface gi1\/1\r\n(conf t) #monitor session 1 source interface gi 1\/2\r\n(conf t) #monitor session 1 destination interface gi1\/3<\/pre>\n<\/div>\n<p>Go to <strong>Monitor &gt; Packet Capture &gt; Configure Capturing<\/strong>. Enable this item and Add Stage Packet Capture<\/p>\n<figure id=\"attachment_1246\" aria-describedby=\"caption-attachment-1246\" style=\"width: 1014px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1246 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140501.png\" alt=\"\" width=\"1014\" height=\"555\" srcset=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140501.png 1014w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140501-300x164.png 300w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140501-768x420.png 768w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140501-65x36.png 65w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140501-225x123.png 225w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140501-350x192.png 350w\" sizes=\"auto, (max-width: 1014px) 100vw, 1014px\" \/><figcaption id=\"caption-attachment-1246\" class=\"wp-caption-text\">Figure 2.56: Packet Capture Stage<\/figcaption><\/figure>\n<figure id=\"attachment_1244\" aria-describedby=\"caption-attachment-1244\" style=\"width: 1012px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1244 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140128.png\" alt=\"\" width=\"1012\" height=\"573\" srcset=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140128.png 1012w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140128-300x170.png 300w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140128-768x435.png 768w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140128-65x37.png 65w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140128-225x127.png 225w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140128-350x198.png 350w\" sizes=\"auto, (max-width: 1012px) 100vw, 1012px\" \/><figcaption id=\"caption-attachment-1244\" class=\"wp-caption-text\">Figure 2.57: Captured Files<\/figcaption><\/figure>\n<p>All Palo Alto Networks firewalls have a built-in packet capture (pcap) feature you can use to capture packets that traverse the network interfaces on the firewall. You can then use the captured data for troubleshooting purposes or to create custom application signatures.<\/p>\n<p>Now, ping from Kali1 to Kali2 again and check the file created in the previous step. Click on the traffic to download in Kali and you are able to open it in Wireshark. Open the file in the Wireshark and verify you have received ICMP Packets.<\/p>\n<figure id=\"attachment_1248\" aria-describedby=\"caption-attachment-1248\" style=\"width: 752px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1248 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140835.png\" alt=\"\" width=\"752\" height=\"573\" srcset=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140835.png 752w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140835-300x229.png 300w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140835-65x50.png 65w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140835-225x171.png 225w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-140835-350x267.png 350w\" sizes=\"auto, (max-width: 752px) 100vw, 752px\" \/><figcaption id=\"caption-attachment-1248\" class=\"wp-caption-text\">Figure 2.58: Wireshark ICMP Packets<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>SSH from Kali1 to Kali 2. Capture the traffic and verify you have received SSH Packets in the Wireshark.<\/p>\n<figure id=\"attachment_1256\" aria-describedby=\"caption-attachment-1256\" style=\"width: 754px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1256 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-141906.png\" alt=\"\" width=\"754\" height=\"651\" srcset=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-141906.png 754w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-141906-300x259.png 300w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-141906-65x56.png 65w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-141906-225x194.png 225w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2026\/01\/Screenshot-2026-01-23-141906-350x302.png 350w\" sizes=\"auto, (max-width: 754px) 100vw, 754px\" \/><figcaption id=\"caption-attachment-1256\" class=\"wp-caption-text\">Figure 2.59: Wireshark SSHv2 packets<\/figcaption><\/figure>\n","protected":false},"author":1562,"menu_order":4,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-1241","chapter","type-chapter","status-publish","hentry"],"part":115,"_links":{"self":[{"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/pressbooks\/v2\/chapters\/1241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/wp\/v2\/users\/1562"}],"version-history":[{"count":18,"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/pressbooks\/v2\/chapters\/1241\/revisions"}],"predecessor-version":[{"id":1347,"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/pressbooks\/v2\/chapters\/1241\/revisions\/1347"}],"part":[{"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/pressbooks\/v2\/parts\/115"}],"metadata":[{"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/pressbooks\/v2\/chapters\/1241\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/wp\/v2\/media?parent=1241"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/pressbooks\/v2\/chapter-type?post=1241"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/wp\/v2\/contributor?post=1241"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/wp\/v2\/license?post=1241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}