Configuring a Collector to decipher encrypted traffic


A web application uses encryption to protect sensitive data that travels between the client and the server. Without the proper deciphering mechanism, the system cannot decrypt the intercepted traffic.

For the system to decipher encrypted traffic, the Security role user uploads cryptographic keys to the Real User Collector and maps them to the particular IP addresses and port numbers.

The following topics provide information and instructions about handling the encrypted traffic:

Note

This information is specific to traffic as it is captured by the Real User Collector on its way into BMC Real End User Experience Monitoring, and not traffic data flowing between the Collector and Analyzer components.

Related topic

Monitoring-encrypted-traffic-on-a-Collector

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*