Set Up Inbound Decryption on Cloud NGFW for AWS

Cloud NGFW uses SSL Inbound Decryption to inspect and decrypt inbound SSL/TLS traffic from a client to a targeted network server (any server you have the certificate for and can import onto the firewall) and block suspicious sessions. The firewall acts as a proxy between the external client and the internal server and generates a new session key for each secure session. The firewall creates a secure session between the client and the firewall and another secure session between the firewall and the server to decrypt and inspect the traffic. However, Cloud NGFW keeps your traffic packet headers and payload intact, providing complete visibility of the source’s identity to your applications in your VPCs.
Your certificate and session key are stored on the AWS secrets manager to perform SSL inbound inspection. The firewall validates that the certificate sent by the targeted server during the SSL/TLS handshake matches a certificate in your decryption policy rule. If there is a match, the firewall forwards the server's certificate to the client requesting server access and establishes a secure connection.
  1. Select
    and select a previously-created rulestack which to apply the certificate.
  2. Select
    , then
    a new
    Security Rule
    for decryption.
    You can create TLS decryption rules with
  3. Provide the following details under
    • Name
      —Name of the rule.
    • Description
      —A description for the rule.
    • Rule Priority
      —A unique priority for the rule.
    • Enabled
      —Enable the field to associate the rulestack with the rule. This field is enabled by default.
  4. Define matching criteria for the
    IP address fields.
  5. Configure
    Granular Controls
    • Specify the
      you want the rule to allow or block.
    • Specify a
      URL Category
      as match criteria for the rule.
    • Specify the
      Protocol and Ports
      you want the rule to allow or block.
  6. Specify the
    you want the firewall to take when the traffic matches one of the rules you created.
    • Allow
      —Allow traffic.
    • Deny
      —Block traffic and enforce the default
      Deny Action
      defined for the application that is being denied.
    • Reset Server
      —Sends the TCP reset to the server-side device.
    • Reset Both
      —Sends a TCP reset to both client and server-side devices.
  7. Under
    TLS Decryption
    , select
    and select an
    Inbound Inspection Certificate
    Create a certificate if you have not done so already.
    The decryption profile for TLS decryption is set to Best Practice Security Policy. See decrypt traffic for full visibility and threat inspection for more information.
    The certificate is stored in the AWS secrets manager. The Amazon Resource Name (ARN) of the secret must be used in the certificate ARN when creating the certificate object. Inbound decryption does not support self-signed certificates.
  8. Click
    to enable logging.
  9. Click
  10. Click
    Config Actions
    Deploy Configuration
    to save the rule to the running configuration the firewall.

Recommended For You