Decrypt Traffic for Full Visibility and Threat Inspection

The best practice security policy dictates that you decrypt all traffic except sensitive categories, which include Health, Finance, Government, Military, and Shopping.
Use decryption exceptions only where required, and be precise to ensure that you are limiting the exception to a specific application or user based on need only:
  • If decryption breaks an important application, create an exception for the specific IP address, domain, or common name in the certificate associated with the application.
  • If a specific user needs to be excluded for regulatory or legal reasons, create an exception for just that user.
To ensure that certificates presented during SSL decryption are valid, configure the firewall to perform CRL/OCSP checks.
Best practice Decryption policy rules include a strict Decryption Profile. Before you configure SSL Forward Proxy, create a best practice Decryption Profile (ObjectsDecryption Profile) to attach to your Decryption policy rules:
  1. Configure the SSL DecryptionSSL Forward Proxy settings to block exceptions during SSL negotiation and block sessions that can’t be decrypted:
    decryption-profile-bp1.png
  2. Configure the SSL DecryptionSSL Protocol Settings to block use of vulnerable SSL/TLS versions (TLS 1.0 and SSLv3) and to avoid weak algorithms (MD5, RC4, and 3DES):
    decryption-profile-bp2.png
  3. For traffic that you are not decrypting, configure the No Decryption settings to block encrypted sessions to sites with expired certificates or untrusted issuers:
    decryption-profile-bp3.png

Related Documentation