Network Visibility TAP Deployment

Overview

Deploy passive network TAP (Test Access Point) for non-intrusive traffic monitoring, packet capture, and security analysis without impacting production traffic.

Hardware Selection

Dualcomm ETAP-2003

Specification Value

Type

Passive Ethernet TAP (no power required)

Speed

10/100/1000 Mbps

Ports

1x Network A, 1x Network B, 2x Monitor (A→B, B→A)

Cable Type

RJ-45 Cat5e/Cat6

Latency

Zero (passive copper connection)

Power

None (fully passive)

Form Factor

Inline device

MSRP

~$250-300

Why Passive TAP

Benefit Explanation

Zero latency

Copper-to-copper connection, no processing delay

No single point of failure

Traffic flows even if TAP is removed (fail-open)

Full duplex capture

Separate monitor ports for each direction

Protocol agnostic

Works with any Ethernet traffic

Tamper evident

Physical device, can’t be compromised remotely

Air-gapped monitoring

Monitor ports are receive-only (no injection)

Architecture

Deployment Position

                                          ┌─────────────┐
                                          │  Security   │
                                          │  Appliance  │
                                          │  (Wazuh)    │
                                          └──────┬──────┘
                                                 │ Monitor A→B
┌──────────┐      ┌────────────┐      ┌─────────┴─────────┐      ┌──────────┐
│ pfSense  │──────│ ETAP-2003  │──────│    c9300-01       │──────│ Internal │
│ Firewall │      │   (TAP)    │      │   Core Switch     │      │ Networks │
└──────────┘      └────────────┘      └───────────────────┘      └──────────┘
   Network A         TAP               Network B

Monitor Ports:
- A→B: Traffic from pfSense to switch (ingress)
- B→A: Traffic from switch to pfSense (egress)
Position Monitors Use Case

Firewall ↔ Core Switch

All inter-VLAN and WAN traffic

Primary - Security monitoring, IDS

Core ↔ ISE

RADIUS, TACACS+, profiling

802.1X troubleshooting

Core ↔ Server VLAN

East-west server traffic

Application security

WAN ↔ Firewall

Raw internet traffic

DDoS detection (dangerous - high volume)

Phases

Phase 1: Hardware Acquisition

  • Purchase Dualcomm ETAP-2003

  • Verify cables: 2x Cat6 (network), 2x Cat6 (monitor)

  • Identify monitoring workstation/server

Phase 2: Monitor Station Setup

  • Configure NIC for promiscuous mode

  • Install capture tools:

    # Rocky Linux / RHEL
    sudo dnf install -y tcpdump wireshark-cli tshark
    
    # Verify promiscuous support
    ip link show eth1 | awk '/PROMISC/{print "Promiscuous mode available"}'
  • Configure NIC to accept all frames:

    sudo ip link set eth1 promisc on
    
    # Verify
    ip link show eth1 | awk '/PROMISC/{print "OK: Promiscuous enabled"}'

Phase 3: TAP Installation (Maintenance Window)

TAP installation requires brief network interruption (~30 seconds). Schedule during maintenance window.

  1. Power down monitoring workstation NIC

  2. Disconnect cable between firewall and core switch

  3. Insert TAP:

    • Network A port → pfSense

    • Network B port → Core switch

  4. Connect monitor cables:

    • Monitor A→B → Monitoring workstation NIC 1

    • Monitor B→A → Monitoring workstation NIC 2

  5. Verify traffic flow:

    # Should see packets immediately
    sudo tcpdump -i eth1 -c 10 -nn

Phase 4: Integration with Wazuh

  • Configure Suricata on monitor station

  • Forward alerts to Wazuh manager

  • Create dashboards for TAP traffic

Phase 5: Documentation

  • Update network diagrams with TAP position

  • Document cable labeling

  • Add to infrastructure inventory

Capture Commands

Basic Capture

# Capture all traffic on monitor port
sudo tcpdump -i eth1 -w /tmp/capture-$(date +%Y%m%d-%H%M%S).pcap

# Capture with rotation (100MB files, keep 10)
sudo tcpdump -i eth1 -w /tmp/capture-%Y%m%d-%H%M%S.pcap -C 100 -W 10

Filtered Capture

# Only HTTP/HTTPS
sudo tcpdump -i eth1 -w /tmp/web.pcap 'port 80 or port 443'

# Only RADIUS (ISE authentication)
sudo tcpdump -i eth1 -w /tmp/radius.pcap 'port 1812 or port 1813'

# Only DNS
sudo tcpdump -i eth1 -w /tmp/dns.pcap 'port 53'

# Specific host
sudo tcpdump -i eth1 -w /tmp/host.pcap 'host {ise-01-ip}'

Live Analysis

# Top talkers by bytes (requires tshark)
tshark -i eth1 -q -z conv,ip -a duration:60

# Protocol distribution
tshark -i eth1 -q -z io,phs -a duration:60

Verification

TAP Health Check

# Verify packets flowing on both monitor ports
for iface in eth1 eth2; do
  echo "=== $iface ==="
  ip -s link show $iface | awk '/RX:/{getline; print "RX bytes:", $1}'
done

Traffic Baseline

After 24 hours, establish baseline:

# Average packets per second
awk '/^[0-9]/{sum+=$1; count++} END{print "Avg PPS:", sum/count}' /var/log/tap-stats.log

Security Considerations

Consideration Mitigation

Physical access

TAP is physical device; secure server room

Monitor port injection

TAP monitor ports are receive-only by design

Captured credentials

Encrypt pcap storage, restrict access

Storage exhaustion

Implement rotation and retention policies

Legal/compliance

Document authorization for packet capture