Skip to main content

Firepower SSL Policy Configuration

Over the years after using firewall of different vendors it is outmost sure that SSL decyrption is mandatory whether it comes to IPS, File level blocking or any other threat prevention techniques to be used. Let me try to write a short blog on how to perform SSL decryption for destination NAT traffic or also know as inbound traffic.

Importing certificate and key
In order for source NAT ( outgoing traffic ) to work we need to either import a certificate or generate a self signed certificate accordingly . In order for destination NAT ( incoming traffic ) to work we need to import the certificate and key that is currently being used by the application itself. This blog is going to be more about destination NAT traffic.
Go to Objects > Object Management > PKI > Internal Certs 

 Add Internal Certs 

Creating SSL Policy
Go to Policies >  SSL Policy and create a new policy
We need to select Decrypt - Known key and also select the certificate and key (DONIDCR-SSL) th
at we have recently imported . The policy needs to be configured as configured on access control policy making used for zone , networks , ports . There are additional option in this policy for server related cipher suits , cert status and version which we can play on as well.



ADDING SSL POLICY TO ACCESS CONTROL POLICY

We will now need this SSL policy to be added on Access control policy 

Go to Policy > Access Control Policy 

We will now need to need to deploy it accordingly and inorder to verify we can check the Events as well.




SSL Status for all the incoming traffic for the web application can now be seen as Decrypt (Known Key) which basically means that SSL decryption is working . 

We also need to know that SSL Policy is always placed before ACP (Access Control Policy ) . SSL Policy is checked before going towards Access Control Policy so we need to configure it carefully otherwise our application might not work accordingly and also must know which traffic to decrypt and which not to. SSL decryption always will place a heavy load on the firewall so we must selectively do it on the application and also checking the load of the firewall.

Comments

Popular posts from this blog

SAN Switch Zoning with Brocade

Zoning in Brocade SAN Switch Let's begin with resetting the switch completely. In my environment I have two brocade SAN Switch connecting to 2 Dell R940 server configured with VMware. The SAN switch will be having connectivity between Dell Unity 500 storage and Dell R940 servers. Multipathing will be done between the server and storage with the help of SAN Switch. Multipathing, also called SAN multipathing or I/O multipathing, is the establishment of multiple physical routes between a server and the storage device that supports. It results in better fault tolerance and performance enhancement. DESIGN The idea behind zoning is that intended WWPN talk with each other . This is more like ACL in the world of Ethernet. To see the devices which are logged into the switch the following commands can be executed. SAN-A:admin> switchshow switchName: SAN-A switchType: 118.1 switchState: Online switchMode: Native switchRole: Principal switchDomain: 1 switchId: ...

SSL Decryption FortiGate

  We have pretty much heard about SSL decryption and of malware hiding inside an encrypted traffic. A large amount of traffic in the internet is pretty much encrypted which basically means that bad things like malware, virus, ransomware can hide inside this encrypted traffic. If majority of these traffic are encrypted our Firewalls are not able to analyze these traffic which can easily infect our organization and the investment which we have done in these firewalls are wasted. There does come around a solution for this and as my topic suggest SSL Decryption also know as Deep Packet Inspection as by some IT folks. The image that I have attached down below clearly suggest about what I am trying to explain. Using deep packet inspection, the firewall simply decrypts the encrypted traffic happening  between client and server, inspects the content to find the threats and block them , then forwards it to the destination re-encrypting it . We will need to first setup the SSL/SSH in...

Upgrade Catalyst C9500

Upgrading Catalyst 9500 series switch is relatively easy. The one that I'm going to upgrade today is on Install mode containing packages.conf file. Install mode consumes far less resources in compared to the traditional bundle mode and has some advantage like auto upgrade when configured in stacked mode. We can talk about the difference between bundle and install mode later on. Let's focus on upgrading the Catalyst 9500 switch. Switch I am trying to upgrade is in 17.03.03 which has some bugs and security vulnerabilities. I am upgrading it from 17.03.03 to 17.6.5(MD) golden image present in the cisco download site for C9500 series switch and also reading down the linked document from cisco that is what they recommend. You can have a look at it . https://www.cisco.com/c/en/us/support/docs/switches/catalyst-9300-series-switches/221498-recommended-releases-for-catalyst-9200-9.html We will first need to create FTP username and password in the switch. The username and password must b...