End-of-Life (EoL)
Create Data-Center-to-Internet Decryption Policy Rules
Create rules that decrypt update, certificate checking,
and any other traffic from data center servers to internet servers
so that you can inspect the traffic and protect your most valuable
assets against malware and other threats.
Create Decryption policy rules to provide
visibility into traffic from data center servers to the internet.
Decrypt all traffic from data center servers to the internet. The
only accounts initiating connections to the internet from inside
the data center are service accounts and most of this traffic pertains
to software updates, so there are no privacy issues to consider.
It’s important to decrypt and inspect this traffic because if an
update server is compromised, data center servers could download
malware and propagate it through the software update process. Inspecting
the traffic and applying the best practice threat prevention profiles
protects your data center against malware that could otherwise be
downloaded from a legitimate update server, using a legitimate application.
In Create
Data-Center-to-Internet Application Whitelist Rules, we created
Security policy rules that allow data center servers to initiate
connections with internet update servers to update operating system
software, DNS, NTP, and to check certificates. Here we create analogous
Decryption policy rules to decrypt the traffic that the update Security
policy rules allow.
Do not decrypt traffic to certificate
revocation servers (online responders). Online Certificate Status
Protocol (OCSP) traffic usually uses HTTP, so the traffic is cleartext
and not encrypted. In addition, SSL Forward Proxy Decryption may
break the update process because the firewall acts as a man-in-the-middle
proxy and replaces the client certificate with a proxy certificate,
which the OCSP responder may not accept as valid.
The
decryption policy rules share some common elements in regard to
these traffic flows:
- When you create a Decryption policy rule, the objective is to decrypt traffic so that a Security policy rule can examine it and allow or block it based on policy. To accomplish that, the Decryption policy rule must use the same source zone(s) and user(s) as the analogous security policy rule, and the same destination zone and address (often defined by a dynamic address group so that as you add or remove servers, you can update the firewall without a commit operation). Defining the same source and destination in the Security policy and in the Decryption policy applies both policies to the same traffic.
- The Action for all of these rules is decrypt.
- All of these decryption rules use the Best Practice data center decryption profile shown in Create the Data Center Best Practice Decryption Profiles.
In
many cases, the Decryption policy rule examples include a custom
URL category ()
to narrow the scope of traffic to decrypt. Each Decryption policy rule
uses the same custom URL category (and source and destination) as
the analogous Security policy rule so that the Decryption and Security
policies apply to exactly the same traffic. The combination of App-ID
and a custom URL category enables the firewall to decrypt only the
traffic the whitelist rule allows, which saves processing cycles
by not decrypting traffic that the firewall will block. (Decryption
must happen before Security policy rule evaluation.)
Objects
Custom
Objects
URL Category
- Decrypt traffic between data center servers and software update servers on the internet.This rule shows how to decrypt data center server software update traffic to provide visibility into threats that may be present on internet update servers so the firewall can block them. This example decrypts allowed traffic between data center servers and CentOS update servers on the internet based on the analogous application whitelist rule we created earlier.To create this rule:
- Specify the same source and destination as in the analogous Security policy rule. In this case, the source is theDev-Serversdynamic address group in theEngineering-DC-Infrazone, and the destination is the internet (L3-Externalzone).
- Specify the same custom URL category as in the analogous Security policy rule (CentOS-Update-Servers) to narrow the scope of decryption to only traffic that the whitelist rule allows so that the firewall doesn’t waste cycles decrypting traffic that it will drop.
- On the Options tab, set the Action toDecryptand the decryption Type toSSL Forward Proxy. Apply the data center best practice Decryption Profile to apply SSL Forward Proxy and SSL Protocol Settings to the traffic.
Create a similar Decryption policy rule for the allowed data center traffic of each group of data center servers that needs to connect to internet update servers, based on the same source and destination, and same custom URL category, as the analogous Security policy rule. For example, the Decryption policy rule for data center servers that need to communicate with Microsoft Windows update servers, based on the analogous Security policy rule, looks like this: - Decrypt traffic between data center servers and NTP and DNS update servers on the internet.This rule shows how to decrypt data center server NTP and DNS update traffic to provide visibility into threats that may be present on these internet servers so the firewall can block them. This example decrypts allowed traffic based on the analogous application whitelist rule we created earlier.To create this rule:
- Specify the same source and destination as in the analogous Security policy rule. In this case, the source is theDNS-NTP-Serversdynamic address group in theIT Infrastructurezone, and the destination is the internet (L3-Externalzone).
- Specify the same custom URL category as in the analogous Security policy rule (NTP-DNS-Update-Servers) to narrow the scope of decryption to only traffic that the whitelist rule allows.
- On the Options tab, set the Action toDecryptand the decryption Type toSSL Forward Proxy. Apply the data center best practice Decryption Profile to apply SSL Forward Proxy and SSL Protocol Settings to the traffic.
Recommended For You
Recommended Videos
Recommended videos not found.