Network Security
Local SSL Decryption Exclusion Cache
Table of Contents
Expand All
|
Collapse All
Network Security Docs
-
- Security Policy
-
- Security Profile Groups
- Security Profile: AI Security
- Security Profile: WildFire® Analysis
- Security Profile: Antivirus
- Security Profile: Vulnerability Protection
- Security Profile: Anti-Spyware
- Security Profile: DNS Security
- Security Profile: DoS Protection Profile
- Security Profile: File Blocking
- Security Profile: URL Filtering
- Security Profile: Data Filtering
- Security Profile: Zone Protection
-
- Policy Object: Address Groups
- Policy Object: Regions
- Policy Object: Traffic Objects
- Policy Object: Applications
- Policy Object: Application Groups
- Policy Object: Application Filter
- Policy Object: Services
- Policy Object: Auto-Tag Actions
- Policy Object: Devices
-
- Uses for External Dynamic Lists in Policy
- Formatting Guidelines for an External Dynamic List
- Built-in External Dynamic Lists
- Configure Your Environment to Access an External Dynamic List
- Configure your Environment to Access an External Dynamic List from the EDL Hosting Service
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Policy Object: HIP Objects
- Policy Object: Schedules
- Policy Object: Quarantine Device Lists
- Policy Object: Dynamic User Groups
- Policy Object: Custom Objects
- Policy Object: Log Forwarding
- Policy Object: Authentication
- Policy Object: Decryption Profile
- Policy Object: Packet Broker Profile
-
-
-
- The Quantum Computing Threat
- How RFC 8784 Resists Quantum Computing Threats
- How RFC 9242 and RFC 9370 Resist Quantum Computing Threats
- Support for Post-Quantum Features
- Post-Quantum Migration Planning and Preparation
- Best Practices for Resisting Post-Quantum Attacks
- Learn More About Post-Quantum Security
-
-
-
- Investigate Reasons for Decryption Failure
- Identify Weak Protocols and Cipher Suites
- Troubleshoot Version Errors
- Troubleshoot Unsupported Cipher Suites
- Identify Untrusted CA Certificates
- Repair Incomplete Certificate Chains
- Troubleshoot Pinned Certificates
- Troubleshoot Expired Certificates
- Troubleshoot Revoked Certificates
Local SSL Decryption Exclusion Cache
The NGFW automatically adds SSL decryption exclusions to the local exclusion cache to
allow application traffic that uses unsupported modes.
Where Can I Use This? | What Do I Need? |
---|---|
|
No separate license required for decryption when using NGFWs or
Prisma Access.
Note: The features and capabilities available to you in
Strata Cloud Manager depend on your active license(s).
|
The Local SSL Decryption Exclusion Cache contains websites that the
Next-Generation Firewall (NGFW) automatically excludes from decryption
because of technical circumstances that break or prevent decryption, such as pinned
certificates, client authentication, or unsupported ciphers. The NGFW
doesn’t decrypt, inspect, and enforce Security policy rules on traffic that the cache
allows because the traffic remains encrypted. However, traffic in the local cache is
excluded from decryption for 12 hours and then ages out. The NGFW
populates the cache based on the decryption profile associated with the decryption
policy rule that controls the traffic. Specifically, if the decryption profile
allows unsupported modes—sessions with client authentication, unsupported
versions, or unsupported cipher suites—and the allowed traffic uses an unsupported mode,
then the device adds the server to the local exclusion cache. Ensure that the sites you
exclude from decryption (for example, by applying a decryption profile that allows
unsupported modes) are sites with applications or services you need for business.
If you allow unsupported mode checks in a decryption profile, the NGFW
adds entries to the cache when:
- The client or server advertises a specific cipher that the server or client doesn’t support.
- The client or server advertises a specific curve that the server or client doesn’t support.
- The client or server advertises a specific protocol version that the server or client doesn't support.
- Examples: The client supports only TLSv1.2, but the server supports only TLSv1.3. In the local cache, the Reason shown for this exclusion is SSL_UNSUPPORTED.
- The client supports TLSv1.3 and TLSv1.2, but the server supports only TLSv1.2. In this case, the Reason shown is TLS13_UNSUPPORTED.When the Reason for adding a server to the Local SSL Decryption Exclusion Cache is TLS13_UNSUPPORTED, the NGFW downgrades the session protocol to TLSv1.2, so it can decrypt and inspect the traffic.
If the decryption profile blocks unsupported modes, the server is not added
to the local cache and the NGFW blocks traffic to and from the server.
Blocking unsupported modes blocks communication with applications that use those modes
to increase security. Client authentication is a common reason for excluding
applications from decryption, which is why best practice is to block unsupported
versions and unsupported ciphers and allow client authentication in the decryption
profile. If the decryption profile allows client authentication and a client starts a
session with a server that requires the client to authenticate, instead of blocking the
traffic because the NGFW can’t decrypt it, the application and server are
added to the local exclusion cache, which allows the traffic.
If you allow traffic from sites that use client authentication and are not in the
predefined or custom SSL decryption exclusion list, create
a decryption profile that allows sessions with client authentication. Add the
profile to a decryption policy rule that applies only to the servers that host the
application.
To increase security further, require multi-factor authentication to complete the
user login process. Alternatively, you can add the site to the SSL decryption exclusion
list to bypass decryption without using an explicit decryption policy
rule.
The local cache contains a maximum of 1,024 entries. Each exclusion entry includes
information about the application, the server, the reason for inclusion in the cache,
the decryption profile applied to the traffic, its virtual system (vsys), and more. You
can’t manually add local exclusions to the cache, but you can add exclusions to the SSL decryption exclusion list
.
To view the Local SSL Decryption Exclusion Cache, superuser or Certificate Management
administrative access is required.
- (PAN-OS and Panorama) Select DeviceCertificate ManagementSSL Decryption Exclusion, and then click Show Local Exclusion Cache.

You can select and delete entries from the local cache manually. You can also delete
cached entries using the clear ssl-decrypt exclude-cache [server <value>]
[application <value>] CLI command.
If anyone attempts to access the same server before the local cache entry ages out (12
hours), the NGFW matches the session to the cache entry, bypasses
decryption, and allows the traffic. The NGFW flushes the local exclusion
cache if you change the decryption policy rule or profile because those changes might
affect the classification of the session. If the cache becomes full, the oldest entries
are purged as new ones arrive.