Network Security
Configure Decryption Port Mirroring
Table of Contents
Expand All
|
Collapse All
Network Security Docs
-
- Security Policy
-
- Security Profile Groups
- Security Profile: AI Security
- Security Profile: WildFire® Analysis
- Security Profile: Antivirus
- Security Profile: Vulnerability Protection
- Security Profile: Anti-Spyware
- Security Profile: DNS Security
- Security Profile: DoS Protection Profile
- Security Profile: File Blocking
- Security Profile: URL Filtering
- Security Profile: Data Filtering
- Security Profile: Zone Protection
-
- Policy Object: Address Groups
- Policy Object: Regions
- Policy Object: Traffic Objects
- Policy Object: Applications
- Policy Object: Application Groups
- Policy Object: Application Filter
- Policy Object: Services
- Policy Object: Auto-Tag Actions
- Policy Object: Devices
-
- Uses for External Dynamic Lists in Policy
- Formatting Guidelines for an External Dynamic List
- Built-in External Dynamic Lists
- Configure Your Environment to Access an External Dynamic List
- Configure your Environment to Access an External Dynamic List from the EDL Hosting Service
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Policy Object: HIP Objects
- Policy Object: Schedules
- Policy Object: Quarantine Device Lists
- Policy Object: Dynamic User Groups
- Policy Object: Custom Objects
- Policy Object: Log Forwarding
- Policy Object: Authentication
- Policy Object: Decryption Profile
- Policy Object: Packet Broker Profile
-
-
-
- The Quantum Computing Threat
- How RFC 8784 Resists Quantum Computing Threats
- How RFC 9242 and RFC 9370 Resist Quantum Computing Threats
- Support for Post-Quantum Features
- Post-Quantum Migration Planning and Preparation
- Best Practices for Resisting Post-Quantum Attacks
- Learn More About Post-Quantum Security
-
-
-
- Investigate Reasons for Decryption Failure
- Identify Weak Protocols and Cipher Suites
- Troubleshoot Version Errors
- Troubleshoot Unsupported Cipher Suites
- Identify Untrusted CA Certificates
- Repair Incomplete Certificate Chains
- Troubleshoot Pinned Certificates
- Troubleshoot Expired Certificates
- Troubleshoot Revoked Certificates
Configure Decryption Port Mirroring
Where permitted by law, you can decrypt traffic and send unencrypted traffic to a
device that can archive and analyze the traffic.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
Before you can enable Decryption Port Mirroring, obtain and install the free Decryption Port
Mirror license. You can activate this license through the Customer Support Portal.
The license requirement ensures that this feature can only be used after approved
personnel purposefully activate the license. After obtaining, installing, and
activating the license, reboot the Next-Generation Firewall (NGFW),
then enable decryption mirroring.
Important Considerations
- Certain countries regulate the decryption, storage, inspection, or use of SSL traffic, and user consent may be required to mirror traffic
- Malicious users with administrative access to the NGFW could potentially harvest sensitive information (for example, usernames, passwords, social security numbers, and credit card numbers) submitted through encrypted channels.
- Consult with corporate counsel before activating and using this feature in a production environment.
- Request a license for each NGFW on which you want to enable decryption mirroring.
- Log in to the Palo Alto Networks Customer Support website and navigate to the Assets tab.
- Select the entry for the NGFW you want to license and select Actions.
- Select Decryption Port Mirror. A legal notice displays.
- Click I understand and wish to proceed when you are clear about the potential legal implications and requirements.
- Click Activate.
- Install the Decryption Port Mirror license.
- On the NGFW, select DeviceLicenses.
- Click Retrieve license keys from license server.
- Verify that the license is active.
- Reboot the NGFW (DeviceSetupOperations). This feature is not available for configuration until PAN-OS reloads.
- Forward decrypted traffic. Superuser permission is required to perform this step.On an NGFW with a single virtual system:
- Select DeviceSetupContent-ID.
- Select Allow forwarding of decrypted content.
- Click OK.
On an NGFW with multiple virtual systems:- Select DeviceVirtual System.
- Select a Virtual System, or create a new Virtual System by selecting Add.
- Select Allow forwarding of decrypted content.
- Click OK.
- Enable the Ethernet interface you want to use for decryption mirroring.
- Select NetworkInterfacesEthernet.
- Click an Ethernet interface. A dialog with various settings appears.
- For Interface Type, select Decrypt Mirror.This interface type appears only if you have installed the Decryption Port Mirror license.
- Click OK.
- Enable mirroring of decrypted traffic.
- Select ObjectsDecryption Profile.
- Select the Interface you will use for Decryption Mirroring.The Interface drop-down contains all Ethernet interfaces of Decrypt Mirror type.
- Specify whether to mirror decrypted traffic before or after policy enforcement.By default, the NGFW mirrors all decrypted traffic to the interface before the Security policy rule lookup, allowing you to replay events and analyze traffic that generates a threat or triggers a drop action.If you want to only mirror decrypted traffic after Security policy enforcement, select the Forwarded Only check box. With this option, only traffic forwarded through the NGFW is mirrored. This option is useful if you are forwarding the decrypted traffic to other threat detection devices, such as a DLP device or another intrusion prevention system (IPS).
- Click OK.
- Attach the decryption profile rule (with decryption port mirroring enabled) to a decryption policy rule. All traffic decrypted based on the policy rule is mirrored.
- Select PoliciesDecryption.
- Select an existing decryption policy rule, or Add a new rule.
- In the Options tab, select Decrypt and the Decryption Profile you created earlier.
- Click OK.
- Save the configuration.Click Commit.