Learn how to configure outbound decryption on the Cloud NGFW for AWS.
Where Can I Use This? | What Do I Need? |
|
- Cloud NGFW subscription
- Palo Alto Networks Customer Support Account (CSP)
- AWS Marketplace account
- User role (either tenant or administrator)
|
With Outbound decryption, Cloud NGFW behaves like an
SSL Forward Proxy, and uses its associated
certificates to establish itself as a trusted third party (meddler in the middle
(MitM)) for the client-server session. However, Cloud NGFW keeps your traffic packet
headers and payload intact, providing complete visibility of the source’s identity
to your destinations.
Outbound decryption uses two certificate objects - Trust and Untrust. The NGFW
presents the trust certificate to clients during SSL decryption if the client is
attempting to connect to a server that has a certificate signed by a trusted
certificate authority (CA). Alternatively. The NGFW presents the untrust certificate
to the client attempting to connect to a server that has a certificate signed by a
CA that the NGFW does not trust.
You can configure the NGFW resource to decrypt the SSL traffic leaving your VPC or
subnet. You can then enforce App-ID and security settings on the plaintext traffic,
including Antivirus, Vulnerability, antispyware, URL Filtering, and file blocking
profiles. After decrypting and inspecting traffic, the firewall reencrypts the
plaintext traffic as it exits the firewall to ensure privacy and security.
This procedure only defines the certificates that the firewall uses for Outbound TLS
decryption. Enable Outbound TLS decryption during
rule creation.