Over the years after using firewall of different vendors it is outmost sure that SSL decyrption is mandatory whether it comes to IPS, File level blocking or any other threat prevention techniques to be used. Let me try to write a short blog on how to perform SSL decryption for destination NAT traffic or also know as inbound traffic.
Add Internal Certs
Importing certificate and key
In order for source NAT ( outgoing traffic ) to work we need to either import a certificate or generate a self signed certificate accordingly . In order for destination NAT ( incoming traffic ) to work we need to import the certificate and key that is currently being used by the application itself. This blog is going to be more about destination NAT traffic.
Go to Objects > Object Management > PKI > Internal Certs
Add Internal Certs
Creating SSL Policy
Go to Policies > SSL Policy and create a new policy
We need to select Decrypt - Known key and also select the certificate and key (DONIDCR-SSL) th
at we have recently imported . The policy needs to be configured as configured on access control policy making used for zone , networks , ports . There are additional option in this policy for server related cipher suits , cert status and version which we can play on as well.
ADDING SSL POLICY TO ACCESS CONTROL POLICY
We will now need this SSL policy to be added on Access control policy
Go to Policy > Access Control Policy
We will now need to need to deploy it accordingly and inorder to verify we can check the Events as well.
SSL Status for all the incoming traffic for the web application can now be seen as Decrypt (Known Key) which basically means that SSL decryption is working .
We also need to know that SSL Policy is always placed before ACP (Access Control Policy ) . SSL Policy is checked before going towards Access Control Policy so we need to configure it carefully otherwise our application might not work accordingly and also must know which traffic to decrypt and which not to. SSL decryption always will place a heavy load on the firewall so we must selectively do it on the application and also checking the load of the firewall.
Comments
Post a Comment