Overview
NDR now features encrypted traffic detection capability. It supports parsing and detecting encrypted traffic (such as HTTPS/TLS) for CVM assets, container assets, and public network traffic GAAP assets, comprehensively enhancing full traffic visibility and threat detection capability. You can refer to this document to learn how to configure and use this feature.
Note:
Currently in public beta version, only available to invited users. Non-invited users who wish to experience this feature can submit a ticket to apply for access. Prerequisites
You need to configure security group rules to grant the probe permission to collect network traffic, meeting the data input requirements for NDR.
The target asset must have TAT or CWPP Agent installed and enabled. This ensures that the system can automatically deploy the endpoint probe through available channels.
Note:
The system first attempts to deploy the endpoint probe through the TAT channel. If TAT is unavailable, it automatically falls back to the host channel to complete the installation. If both channels are unavailable, the page will display a banner notification, indicating that the current instance does not meet the Agent installation requirements.
Method 1: Configuration of the Enterprise Security Group
2. On the Enterprise Security Group page, click Add Rule, and enter the rule information as required in the table.
|
Access source IP address | 0.0.0.0/0 |
Access destination IP address | 9.9.9.199 |
Destination port | 47891,47892,47893 |
Protocol | UDP |
Policy | Allow |
Description | NDR allow rule |
3. Click Save, and the rule will be deployed to associated instances.
Method 2: Configuration of the Single Instance
2. On the instance page, click the instance name that requires detection of encrypted traffic to be enabled.
3. On the instance details page, select Security Group, and click the Security Group ID/Name of the bound security group.
4. Click Add Rule, and fill in the rule information according to the requirements in the table.
|
Type | Custom |
Target | 9.9.9.199 |
Protocol Port | UDP: 47891,47892,47893 |
Policy | Allow |
Remark | NDR allow rule |
5. Click OK, and the rule will be deployed to associated instances.
Specification Description
Note:
CVM assets and container assets specifications primarily refer to host and cluster resources; GAAP assets specifications refer to the performance metrics of their acceleration instances.
Viewing Specifications
Specifications include the applicable scope and capabilities of encrypted traffic detection, as well as resource consumption.
1. Log in to the CFW console, in the left sidebar, click Network Detection and Response. 2. On the NDR page, click View Applicable Scope and Capabilities, Resource Occupancy to view the detailed applicable scope and capabilities, and resource occupancy in the side panel.
Kernel Version Compatibility
Linux kernel version | Applicable | Not applicable |
Below 4.18 | Curl command Python version 3.8.15 and above | OpenSSL dynamic library Java program Golang program |
Greater than or equal to 4.18 | OpenSSL dynamic library Curl command Python version 3.8.15 and above GnuTLS dynamic library | Java program Golang program |
Specific Decryption Capability
Protocol compatibility: HTTPS, SMTPS, FTPS.
Algorithm support: TLS 1.2/1.3 (RSA, ECDHE, DHE).
Length: The maximum length of a single encrypted traffic packet supporting decryption is 64K.
Performance: 10Gbps (supports dynamic scaling).
Resource consumption
CVM Encrypted Traffic Detection
Resource occupancy: Under the traffic pressure of establishing 100 new HTTPS sessions per second, the resource utilization of the encrypted traffic detection Agent is as follows.
CPU occupancy: When continuously establishing new HTTPS sessions at a rate of 100 per second in the runtime environment, the single-core CPU utilization is approximately 10%. It supports up to 60% occupancy rate, corresponding to about 600 new HTTPS sessions per second.
Memory usage: Initialization occupies 100 MB, which increases as the number of new HTTPS sessions grows, with a maximum occupancy of 500 MB.
Exceeding Limits and Suspension:
Trigger condition: When CPU or memory usage exceeds the limit, the Agent automatically pauses the encrypted traffic analysis feature.
Scope of impact: Other basic features remain unaffected, and the Agent will not disrupt existing service connections. However, it will not generate new encrypted traffic analysis results.
Recovery mechanism: The system automatically attempts to resume analysis every 10 minutes. If the limit is still exceeded after resumption, the pause will continue until resource usage falls within the threshold.
Container Encrypted Traffic Detection
After you enable the container decryption feature, the system creates an Agent Pod for encrypted traffic detection in the Workload > DaemonSet of the corresponding TKE. Its resource usage limits are as follows:
Overall limit: A single Agent Pod can occupy up to 50% of a single-core CPU and 500 MB of memory.
CPU occupancy:
Each node with encrypted traffic detection enabled will independently create a corresponding Agent Pod. The functioning of this Pod will not affect the normal operation of other business Pods on the same node.
The TKE platform enforces mandatory limits on the CPU and memory usage of DaemonSet Pods. If a Pod's resource usage still exceeds the limit (e.g., due to anomalies breaking through 50% CPU or 500MB memory), the platform will automatically destroy the Pod and rebuild a new instance. This process will not affect other business Pods on the same node.
Enable Detection of Encrypted Traffic
Log in to the CFW console, in the left sidebar, click Network Detection and Response. Note:
This section uses CVM assets as an example to describe the relevant operations. The operations for other assets are similar.
You must enable the NDR switch before you can enable encrypted traffic detection. When the NDR switch is not enabled, hovering the mouse over the encrypted traffic detection switch prompts the message "Enable NDR collection first, then enable encrypted traffic detection". For details on enabling the NDR switch, see Network Detection and Response Switch. Pre-checks
Before encrypted traffic detection is enabled, the system automatically fetches and verifies the status of the account, region, instance, network, quota, bandwidth, Agent, and container permissions. Based on the verification results, it then categorizes the assets into the following three statuses:
Ready to enable: All checks have passed, and encrypted traffic detection can be enabled normally.
Ready to Enable (with risk): There are certain risks (such as insufficient bandwidth margin), but it can still be enabled. The system will display risk prompt information.
Cannot Enable: There are blocking issues (such as region not supported, OS incompatible, insufficient quota, and so on). You must resolve all issues according to the guidance before enabling.
The system performs checks from the following dimensions. If the pre-check fails, the encrypted traffic toggle status of the asset will be displayed as Cannot Enable or Ready to Enable (with risk). For details on the specific exception causes and solutions, see Asset Status Description. |
Region and Product Availability | Pre-check | Whether the region supports the traffic analysis service. |
Resource Existence and Basic Information | Pre-check / Triggered check | Valid subnet ID of the instance, and no conflicting image binding on the instance. |
Instance and OS Compatibility | Pre-check | Whether the instance type supports mirroring mode, and whether the operating system is on the supported list. |
Network and Bandwidth Health | Triggered check | Real-time bandwidth of the instance and the threshold; purchased bandwidth limit of the account. |
Quotas and Resource Limits | Pre-check | Upper limit on the number of enabled instances. |
Container Scenarios and Permissions | Pre-check | Access permissions for the container cluster KubeConfig; DaemonSet status and Pod health. |
Account and Allowlist | Pre-check | Whether the VPC traffic mirroring allowlist has been enabled. |
Instance TAT / Agent Status | Pre-check | Whether TAT has been installed. |
Note:
Pre-check: The system automatically checks every 5 minutes whether the assets meet the enabling conditions.
Triggered Check: The system triggers verification when a user selects an asset and enables the NDR toggle or the encrypted traffic detection toggle. After the verification is complete, the system synchronously updates the pre-check status.
Single CVM Asset
On the NDR page, click Enable encrypted traffic in the operation column. The system will then enable the encrypted traffic detection feature for that CVM asset and automatically deploy the endpoint probe. During deployment, installation commands are preferentially delivered via the TAT channel. If the TAT channel is unavailable, the system automatically falls back to the host channel to complete the installation, requiring no manual intervention. After enabling, the real-time detection status is displayed on the page. For details on the status description, see Asset Status Description. Note:
To stop encrypted traffic detection for the CVM asset, disable the corresponding toggle in the Operation column. The system will then cease performing encrypted traffic decryption for that asset and will only conduct regular detection based on plaintext traffic.
Multiple Assets of CVM
On the NDR > CVM page, click More actions > Detect all encrypted traffic or More Actions > Detect not detect any encrypted traffic to enable or disable encrypted traffic detection for all CVM assets. Note:
When all are enabled, the system performs a pre-check on each asset. Assets whose pre-check status is "Cannot Enable" are skipped, and the system prompts the reason for skipping.
If you only need to enable or disable encrypted traffic detection for some CVM assets, follow these steps:
1.1 Select the CVM assets that require configuration.
Note:
Assets with NDR disabled or in an abnormal state cannot be selected. For details on the asset status description, see Asset Status Description. 1.2 Click More actions and select Detect selected encrypted traffic or Do not detect selected encrypted traffic.
Asset Status Description
In the CVM asset list, the system displays the real-time operational status of assets in the Encrypted Traffic Detection Status column:
|
Encrypted Traffic Detection Status | Enabled, Disabled, Automatically disabled, Disabling, Enabling, Enable failed, Enableable - with risk, Not enableable, Endpoint Agent loading abnormal, Endpoint Agent abnormal | Displays the enabled status and abnormal conditions of encrypted traffic detection. |
When the status is abnormal (for example, enabling fails, cannot be enabled, or the terminal Agent is abnormal), the page displays a red warning icon and exception information, indicating that the current detection is unavailable. Hover over the status to view the specific cause and operation instructions. The exception information and instructions include:
|
The instance does not have the Terminal Automation Tool (TAT) installed. | The instance does not have Endpoint TAT installed. Please see TAT Deployment Guide and retry after completing the installation. |
Automatic NDR-Agent installation not supported on the current instance. | The TAT channel and host channel of the current instance are unavailable, preventing automatic installation of NDR-Agent. Confirm that the instance has TAT Agent or CWPP Agent installed and enabled, then retry. If installation still fails, submit a ticket to contact technical support. |
The current operating system type is not supported. | The current operating system is not supported. Please visit the NDR-Technical Solution to confirm compatibility. |
The server is temporarily unavailable. Please try again later. | Temporary unavailability of the server has been detected. Please wait 5 minutes and try again. If the issue persists, please submit a ticket to contact technical support. |
Permission exception when container cluster access is obtained | An exception occurred while obtaining container cluster permissions and creating the Agent DaemonSet Pod. Please submit a ticket to apply. |
Terminal Agent abnormal | 1. The Agent network may be abnormal. Please check whether security groups allow access. 2. Operation of the Agent process may be abnormal. Please verify the operating system status. 3. If no abnormalities are detected, submit a ticket to contact technical support. |
Terminal Agent loading exception | A loading exception occurred during the Agent deployment process. Please try again later. If the exception persists, please submit a ticket to contact technical support. |
Region not supported | The current region does not support the traffic analysis service. Please submit a ticket to apply for enabling the service or view the list of supported regions. |
Instance with conflicting traffic mirror binding. | |
Instance type not supported | The current instance model does not support mirroring mode. See the list of supported models or submit a ticket to request adaptation. |
Number of enabled instances exceeds the limit. | The current quota has been exhausted. Please submit a ticket to request a quota increase. |
VPC traffic mirroring allowlist not enabled. | The current account has not been added to the allowlist for VPC traffic mirroring. Please submit a ticket to apply for enabling the service. Provide the VPCID and region information. |
Status Monitoring
The system has added a dedicated encrypted traffic statistics panel in the Status Monitoring module to help you monitor the operational status and overall scale of encrypted traffic detection in real time. The core monitoring metrics include the following three items:
Statistics on cumulative parsed volume of encrypted traffic: Shows the total volume of encrypted traffic that has been parsed.
Number of Encrypted Detection Asset Instances: Shows the number of CVM assets for which encrypted traffic detection is currently enabled.
Trend Chart of Cumulative Encrypted Traffic: Illustrates the dynamic changes in encrypted traffic parsing volume over the last seven days.
Encrypted Protocol Traffic Log
On the Log Auditing > NDR Logs > Traffic Analysis Logs or Traffic Alarm Logs page, for traffic logs of encrypted protocols such as HTTPS, SMTPS, and FTPS, the system first restores the plaintext content (such as request headers, response bodies, and other fields) and marks it with Decryption Detection. You can also quickly filter and view all logs related to encrypted traffic detection by selecting the Show Only Decryption Detection option.