Network Security
Configure SSL Inbound Inspection (Strata Cloud Manager)
Table of Contents
Expand All
|
Collapse All
Network Security Docs
-
- Security Policy
-
- Security Profile Groups
- Security Profile: AI Security
- Security Profile: WildFire® Analysis
- Security Profile: Antivirus
- Security Profile: Vulnerability Protection
- Security Profile: Anti-Spyware
- Security Profile: DNS Security
- Security Profile: DoS Protection Profile
- Security Profile: File Blocking
- Security Profile: URL Filtering
- Security Profile: Data Filtering
- Security Profile: Zone Protection
-
- Policy Object: Address Groups
- Policy Object: Regions
- Policy Object: Traffic Objects
- Policy Object: Applications
- Policy Object: Application Groups
- Policy Object: Application Filter
- Policy Object: Services
- Policy Object: Auto-Tag Actions
- Policy Object: Devices
-
- Uses for External Dynamic Lists in Policy
- Formatting Guidelines for an External Dynamic List
- Built-in External Dynamic Lists
- Configure Your Environment to Access an External Dynamic List
- Configure your Environment to Access an External Dynamic List from the EDL Hosting Service
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Policy Object: HIP Objects
- Policy Object: Schedules
- Policy Object: Quarantine Device Lists
- Policy Object: Dynamic User Groups
- Policy Object: Custom Objects
- Policy Object: Log Forwarding
- Policy Object: Authentication
- Policy Object: Decryption Profile
- Policy Object: Packet Broker Profile
-
-
-
- The Quantum Computing Threat
- How RFC 8784 Resists Quantum Computing Threats
- How RFC 9242 and RFC 9370 Resist Quantum Computing Threats
- Support for Post-Quantum Features
- Post-Quantum Migration Planning and Preparation
- Best Practices for Resisting Post-Quantum Attacks
- Learn More About Post-Quantum Security
-
-
-
- Investigate Reasons for Decryption Failure
- Identify Weak Protocols and Cipher Suites
- Troubleshoot Version Errors
- Troubleshoot Unsupported Cipher Suites
- Identify Untrusted CA Certificates
- Repair Incomplete Certificate Chains
- Troubleshoot Pinned Certificates
- Troubleshoot Expired Certificates
- Troubleshoot Revoked Certificates
Configure SSL Inbound Inspection (Strata Cloud Manager)
- Verify that the appropriate interfaces are configured as either virtual wire, Layer 2, or Layer 3 interfaces.You can't use a tap mode interface for SSL Inbound Inspection.To view the configured interfaces, select Manage Configuration NGFW and Prisma AccessDevice SettingsInterfaces. You can select an interface to modify its configuration, including the interface type.
- Verify installation of the certificate for the destination server.To view installed certificates, log in to Strata Cloud Manager and select DeviceCertificate ManagementCertificatesDevice Certificates.The TLS versions that your web server supports determine how you should install the server certificate and key. We recommend uploading a certificate chain (a single file) if your end-entity (leaf) certificate is signed by one or more intermediate certificates and your web server supports TLSv1.2 and either RSA or PFS key exchange algorithms. Uploading the chain avoids client-side server certificate authentication issues.Arrange the certificates in the file as follows:
- End-entity (leaf) certificate
- Intermediate certificates (in issuing order)
- (Optional) Root certificate
You can upload the server certificate and private key alone to Strata Cloud Manager when the leaf certificate is signed by intermediate certificates, if your web server supports TLSv1.3 connections and the certificate chain has been installed on the server. SSL Inbound Inspection discusses each case in detail.To import the server certificate onto Strata Cloud Manager:- Select Manage ConfigurationNGFW and Prisma AccessObjectsCertificate Management, and then Import a Custom Certificate.
- Enter a descriptive Certificate Name.
- Browse for and select the Certificate File.
- Save the certificate.
- Create a decryption policy rule to define the traffic that the NGFW decrypts.
- Select Manage ConfigurationNGFW and Prisma AccessSecurity ServicesDecryption, and then Add Rule or select an existing rule.
- Under the Action and Advanced Inspection section, configure the following settings:
- For Action, select Decrypt.
- For Type, select SSL Inbound Inspection.
- Add up to 12 Certificates for the internal server you want to protect.To update the certificate for a protected internal server without incurring downtime, follow these steps:
- Renew or obtain a new server certificate before the current one expires or otherwise becomes invalid.
- Import the new certificate and private key onto your NGFW.
- Add the new certificate to your SSL Inbound Inspection policy rule.This must be done while a different certificate is active on the web server, so that a valid certificate in the policy rule always matches the certificate presented by the server.
- Install the new certificate on your web server, and then verify that it was properly installed.
Installation of the new certificate doesn't impact existing connections. The NGFW verifies that the certificate in the Server Hello message matches the certificate in your decryption policy rule. If there isn't a match, the session ends, and the corresponding decryption log entry reports the session-end reason as a certificate mismatch between the firewall and server. To view the server certificates used in all inbound inspection sessions, select the Log Successful TLS handshakes and Log Unsuccessful TLS handshakes options under the Log Settings section of a decryption policy rule. - (Best Practice) Select or create a that blocks insecure protocol versions and cipher suites.To create a best practice decryption profile for SSL Inbound Inspection, configure the options described in SSL Inbound Inspection Decryption Profile.Create separate profiles for servers with different security capabilities. For example, if a group of servers supports only RSA, in the SSL Protocol Settings of the decryption profile, select only RSA for the key exchange algorithm. Likewise, for servers that support only PFS, set the SSL Protocol Settings to only support PFS.Configure the SSL Protocol Settings for the highest level of security that the server supports, but check performance to ensure that the NGFW can handle the higher processing load that higher security protocols and algorithms require.
- Save your changes.
- (Advanced WildFire subscriptions only) Forward decrypted SSL traffic to the Advanced WildFire cloud for analysis.
- Commit your changes.
- (PAN-OS 11.2 & later, HSM deployments only) Activate TLSv1.3 support for SSL Inbound Inspection with an HSM.Use the set ssl inbound-inspection tls1.3-with-hsm enable yes CLI command.
- Choose your next step:
- Enable users to opt out of SSL decryption.
- Configure decryption exclusions for traffic that you don’t want to decrypt.