Network Security
Configure SSL Forward Proxy
Table of Contents
Expand All
|
Collapse All
Network Security Docs
-
- Security Policy
-
- Security Profile Groups
- Security Profile: AI Security
- Security Profile: WildFire® Analysis
- Security Profile: Antivirus
- Security Profile: Vulnerability Protection
- Security Profile: Anti-Spyware
- Security Profile: DNS Security
- Security Profile: DoS Protection Profile
- Security Profile: File Blocking
- Security Profile: URL Filtering
- Security Profile: Data Filtering
- Security Profile: Zone Protection
-
- Policy Object: Address Groups
- Policy Object: Regions
- Policy Object: Traffic Objects
- Policy Object: Applications
- Policy Object: Application Groups
- Policy Object: Application Filter
- Policy Object: Services
- Policy Object: Auto-Tag Actions
- Policy Object: Devices
-
- Uses for External Dynamic Lists in Policy
- Formatting Guidelines for an External Dynamic List
- Built-in External Dynamic Lists
- Configure Your Environment to Access an External Dynamic List
- Configure your Environment to Access an External Dynamic List from the EDL Hosting Service
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Policy Object: HIP Objects
- Policy Object: Schedules
- Policy Object: Quarantine Device Lists
- Policy Object: Dynamic User Groups
- Policy Object: Custom Objects
- Policy Object: Log Forwarding
- Policy Object: Authentication
- Policy Object: Decryption Profile
- Policy Object: Packet Broker Profile
-
-
-
- The Quantum Computing Threat
- How RFC 8784 Resists Quantum Computing Threats
- How RFC 9242 and RFC 9370 Resist Quantum Computing Threats
- Support for Post-Quantum Features
- Post-Quantum Migration Planning and Preparation
- Best Practices for Resisting Post-Quantum Attacks
- Learn More About Post-Quantum Security
-
-
-
- Investigate Reasons for Decryption Failure
- Identify Weak Protocols and Cipher Suites
- Troubleshoot Version Errors
- Troubleshoot Unsupported Cipher Suites
- Identify Untrusted CA Certificates
- Repair Incomplete Certificate Chains
- Troubleshoot Pinned Certificates
- Troubleshoot Expired Certificates
- Troubleshoot Revoked Certificates
Configure SSL Forward Proxy
SSL Forward Proxy decryption enables a Next-Generation Firewall to see potential
threats in outbound encrypted traffic and apply security protections against those
threats.
Where Can I Use This? | What Do I Need? |
---|---|
|
No separate license required for decryption when using NGFWs or
Prisma Access.
Note: The features and capabilities available to you in
Strata Cloud Manager depend on your active license(s).
|
To enable SSL Forward
Proxy decryption, set up the certificates required to establish the
Next-Generation Firewall (NGFW) as a trusted third party (proxy) to
the session between the client and the server. You can use certificates signed by an
enterprise certificate authority (CA) or self-signed certificates generated on the
NGFW as Forward Trust certificates to authenticate
the SSL/TLS session with the client.
- (Best Practice) Enterprise CA-signed Certificates—An enterprise CA can issue a signing certificate that an NGFW uses to sign the certificates for sites requiring SSL/TLS decryption. When the NGFW trusts the CA that signed the certificate of the destination server, it can send a CA-signed copy of the destination server certificate to the client.This is a best practice because it streamlines the rollout process. Network devices typically trust the enterprise CA already (it is usually installed in the devices’ CA trust storage), so you don’t need to deploy the certificate on endpoints.
- Self-signed Certificates—An NGFW can act as a CA and generate self-signed certificates that it uses to sign the certificates for sites requiring SSL/TLS decryption. The NGFW signs a copy of the server certificate to present to the client and establish an SSL session. This method requires installation of the self-signed certificates on all network devices, so that those devices recognize the self-signed certificates. Self-signed certificates are better for small deployments and proof of concept (PoC) trials because of the need to install certificates on all devices.
Additionally, set up a Forward Untrust certificate for the NGFW to
present to clients when the server certificate is signed by a CA that the NGFW doesn't trust. This ensures that clients receive a certificate
warning when attempting to access sites with untrusted certificates.
Generate separate subordinate Forward Trust CA certificates for each NGFW,
regardless of if you use enterprise-CA signed or self-signed certificates. This
practice offers several benefits:
- Enables you to revoke one certificate when you decommission a device (or device pair) without affecting the rest of the deployment.
- Reduces the impact in any situation requiring revocation of a certificate.
- Improves troubleshooting because the CA error message the user sees includes information about the NGFW the traffic is traversing. If you use the same Forward Trust CA, you lose the granularity of that information.
After setting up Forward Trust and Forward Untrust certificates, create a decryption policy rule to define the traffic you want to
decrypt. Next, create a decryption profile to apply additional SSL/TLS
controls and checks to the traffic defined in the decryption policy rule. Traffic
that matches the rule is converted to cleartext. The NGFW blocks and
restricts traffic based on the decryption profile and Security policy rules, then
re-encrypts the traffic as it exits the NGFW.
When you configure SSL Forward Proxy, the proxied traffic does
not support DSCP code points or QoS.
Configure SSL Forward Proxy (Strata Cloud Manager)
- Verify that the appropriate interfaces are configured as either virtual wire, Layer 2, or Layer 3 interfaces.To view the configured interfaces, select Manage Configuration NGFW and Prisma AccessDevice SettingsInterfaces.
- Configure the Forward Trust certificate that the NGFW presents to clients when a trusted CA has signed the server certificate.(Best Practice) Use an enterprise CA-signed certificate as the Forward Trust certificate.
- Generate a certificate signing request (CSR) for the enterprise CA to
sign and validate:
- Select ManageConfiguration NGFW and Prisma Access Objects Certificate Management.
- Click Generate to add a custom certificate.
- Enter a Certificate Name. Use a unique name for each NGFW.
- For Signed By, select External Authority (CSR).
- For Certificate Use For, select Forward Trust Certificate.
- Specify Cryptographic Settings: Algorithm, Number of Bits, Digest, and Expiration.
- (Optional) If your enterprise CA requires it, add Certificate Attributes to further identify NGFW details, such as Country or Department.
- (Optional) Select an OCSP Responder.
- Save the CSR. The pending certificate displays under Custom Certificates.
- Export the CSR:
- Under Custom Certificates, select the pending certificate, and then click Export Certificate.
- Click Export to download and save the certificate file.
- Select a Format for the certificate, and Save the setting to download the certificate file.
- Provide the certificate file to your enterprise CA. When you receive the enterprise CA-signed certificate, save it onto your system.
- Import the enterprise CA-signed certificate onto Strata Cloud Manager. An Import Certificate dialog appears.
- Enter the pending Certificate Name exactly.The Certificate Name that you enter must exactly match the pending certificate name for the pending certificate to be validated.
- Select the signed Certificate File that you received from your enterprise CA.
- (Optional) Browse and select a Key File.
- (Optional) Enter a Passphrase, then Confirm Passphrase
- Click Save to import the signed certificate.
- Select the validated certificate and for Certificate Use For, select Forward Trust Certificate.
- Click Update to confirm your changes.
Use a self-signed certificate as the Forward Trust certificate:- Create a self-signed root CA certificate.
- Select Manage Configuration NGFW and Prisma Access Objects Custom Certificates.
- Generate a certificate.
- Enter a Certificate Name, such as GlobalProtect_CA.
- Generate a certificate.
- Enter a Common Name: the FQDN (recommended) or IP address of the interface where you will configure the service that will use this certificate.
- Leave Signed By blank.
- For Certificate Use For, select Forward Trust Certificate.
- Specify Cryptographic Settings: Algorithm, Number of Bits, Digest, and Expiration.
- Leave the OCSP Responder field blank. Revocation status verification doesn’t apply to root CA certificates.
- If your enterprise CA requires it, Add Certificate Attributes such as Country or Department to further identify the NGFW.
- Click Save to generate the certificate.
- Configure the certificate to be used as a trusted root CA.
- Click the certificate from the list of Custom Certificates (Manage ConfigurationNGFW and Prisma AccessObjectsCertificate Management). Certificate settings and details appear.
- For Certificate Use for, select Trusted Root CA.
- Save the certificate.
- Generate new subordinate CA certificates for each NGFW:
- Select Manage ConfigurationNGFW and Prisma AccessObjectsCertificate Management.
- Click Generate.
- Enter a Certificate Name
- Enter a Common Name. This should be the IP address or FQDN that appears in the certificate.
- For Signed By, select the self-signed root CA certificate that you created.
- For Certificate Use For, select Forward Trust Certificate.
- Select Certificate Authority to enable the NGFW to issue the certificate. This creates a certificate authority (CA) that is imported to client browsers, so clients trust the NGFW as a CA.
- Specify Cryptographic Settings: Algorithm, Number of Bits, Digest, and Expiration.
- Leave the OCSP Responder field blank; revocation status verification doesn’t apply to root CA certificates.
- If your enterprise CA requires it, Add Certificate Attributes such as Country or Department to further identify the NGFW.
- Save the certificate to generate.
- Repeat this procedure to generate a unique subordinate CA certificate on each NGFW.
- Generate a certificate signing request (CSR) for the enterprise CA to
sign and validate:
- Distribute the Forward Trust certificate to client system certificate stores.Skip this step if you are using an enterprise-CA signed certificate as the Forward Trust certificate and the client systems already have the enterprise CA installed in the local trusted root CA list. (The client systems trust the subordinate CA certificates you generate on the NGFW because the enterprise trusted root CA has signed them.)If you do not install the Forward Trust certificate on client systems, users see certificate warnings for each SSL site they visit.On an NGFW configured as a GlobalProtect portal:This option is supported with Windows and Mac client OS versions, and requires GlobalProtect agent 3.0.0 or later to be installed on the client systems.
- Select NetworkGlobalProtectPortals and then select an existing portal configuration or Add a new one.
- Select Agent and then select an existing agent configuration or Add a new one.
- Add the self-signed trusted root CA certificate to the Trusted Root CA section. After GlobalProtect distributes the trusted root CA certificate to client systems, the client systems trust the NGFW's subordinate CA certificates because the clients trust the NGFW's root CA certificate.
- Install in Local Root Certificate Store so that the GlobalProtect portal automatically distributes the certificate and installs it in the certificate store on GlobalProtect client systems.
- Click OK twice.
Without GlobalProtect:Export the trusted root CA certificate so that you can import it into client systems. Highlight the certificate and click Export at the bottom of the window. Choose the PEM format.Don’t select Export private key. The private key should remain on the NGFW and not be exported to client systems.Import the trusted root CA certificate into the browser Trusted Root CA list on the client systems for the clients to trust it. When importing into the client browser, ensure that you add the certificate to the Trusted Root Certification Authorities certificate store. On Windows systems, the default import location is the Personal certificate store. You can also simplify this process by using a centralized deployment option, such as an Active Directory Group Policy Object (GPO). - Configure the Forward Untrust certificate (use the same Forward Untrust certificate for each NGFW).
- Select Manage Configuration NGFW and Prisma Access Objects Custom Certificates
- Generate a certificate.
- Enter a Certificate Name, such as my-ssl-fwd-untrust.
- Enter a Common Name, for example 192.168.2.1.
- Leave Signed By blank.
- For Certificate Use For, select Forward Untrust Certificate.
- Specify Cryptographic Settings: Algorithm, Number of Bits, Digest, and Expiration.
- (Optional) If your enterprise CA requires it, Add Certificate Attributes such as Country or Department to further identify the NGFW.
- (Optional) Select an OCSP Responder.
- Click Save.Don't export the Forward Untrust certificate to the certificate trust lists of your network devices. Don't install the Forward Untrust certificate on client systems. Installing the Untrust certificate in the Trust List results in devices trusting websites that the NGFW doesn't trust. In addition, users won’t see certificate warnings for untrusted sites, so they may access those sites, which could expose your network to threats.
- (Optional) Configure the key size for the SSL Forward Proxy server certificates that the NGFW presents to clients.By default, the NGFW determines the key size to use based on the key size of the destination server certificate.
- Create a decryption policy rule to define criteria that traffic must match for SSL Forward Proxy decryption.
- In the Action and Advanced Inspection section, for Action, select Decrypt.
- For decryption Type, select SSL Forward Proxy.
- (Optional but a best practice) Configure or select a Decryption Profile to block and control various aspects of matching traffic.For example, create a decryption profile or select one that performs certificate checks and blocks weak cipher suites and protocols from allowing questionable traffic on your network.
- Save the decryption policy rule.
- Push Config to start enforcing the rule.
- Choose your next step:
- Enable users to opt out of SSL decryption.
- Configure decryption exclusions to disable decryption for certain types of traffic.
- (Advanced WildFire subscriptions only) Forward decrypted SSL traffic for WildFire analysis.
Configure SSL Forward Proxy (PAN-OS)
- Verify that the appropriate interfaces are configured as either virtual wire, Layer 2, or Layer 3 interfaces.To view the configured interfaces, select NetworkInterfacesEthernet tab. The Interface Type column displays if an interface is configured to be a Virtual Wire or Layer 2, or Layer 3 interface. You can select an interface to modify its configuration, including what type of interface it is.
- Configure the Forward Trust certificate that the NGFW presents to clients when a trusted CA has signed the server certificate.(Recommended Best Practice) Use an enterprise CA-signed certificate as the Forward Trust certificate.
- Generate a certificate signing request (CSR) for the enterprise CA to
sign and validate:
- Select DeviceCertificate ManagementCertificates and click Generate.
- Enter a Certificate Name. Use a unique name for each NGFW.
- In the Signed By drop-down, select External Authority (CSR).
- (Optional) If your enterprise CA requires it, add Certificate Attributes to further identify the NGFW details, such as Country or Department.
- Click Generate to save the CSR. The pending certificate displays on the Device Certificates tab.
- Export the CSR:
- Select the pending certificate displayed on the Device Certificates tab.
- Click Export to download and save the certificate file.Leave Export private key unselected to ensure that the private key remains securely on the NGFW.
- Click OK.
- Provide the certificate file to your enterprise CA. When you receive the enterprise CA-signed certificate, save it onto your system.
- Import the enterprise CA-signed certificate onto the NGFW:
- Select DeviceCertificate ManagementCertificates and click Import.
- Enter the pending Certificate Name exactly.The Certificate Name that you enter must exactly match the pending certificate name for the pending certificate to be validated.
- Select the signed Certificate File that you received from your enterprise CA.
- Click OK. The certificate is displayed as valid with the Key and CA checkboxes selected.
- Select the validated certificate to enable it as a Forward Trust Certificate.
- Click OK to save the enterprise CA-signed forward trust certificate.
Use a self-signed certificate as the Forward Trust certificate:- Create a self-signed root CA certificate.
- Click the self-signed root CA certificate (DeviceCertificate ManagementCertificatesDevice Certificates) to open Certificate information and then click the Trusted Root CA checkbox.
- Click OK.
- Generate new subordinate CA certificates for each NGFW:
- Select DeviceCertificate ManagementCertificates.
- Click Generate at the bottom of the window.
- Enter a Certificate Name.
- Enter a Common Name, such as 192.168.2.1. This should be the IP address or FQDN that will appear in the certificate. In this example, we are using the IP address of the trust interface. Avoid using spaces in this field.
- In the Signed By field, select the self-signed root CA certificate that you created.
- Select the Certificate Authority check box to enable the NGFW to issue the certificate. Selecting this check box creates a certificate authority (CA) on the NGFW that is imported to the client browsers, so clients trust the NGFW as a CA.
- Generate the certificate.
- Click the new certificate to modify it and click the Forward Trust Certificate checkbox to configure the certificate as the Forward Trust Certificate.
- Click OK to save the self-signed forward trust certificate.
- Repeat steps2.d,2.e, and2.ffor eachNGFW.
- Generate a certificate signing request (CSR) for the enterprise CA to
sign and validate:
- Distribute the Forward Trust certificate to client system certificate stores.Skip this step if you are using an enterprise-CA signed certificate as the Forward Trust certificate for SSL Forward Proxy decryption and the client systems already have the enterprise CA installed in the local trusted root CA list. (The client systems trust the subordinate CA certificates you generate on the NGFW because the enterprise trusted root CA has signed them.)If you do not install the Forward Trust certificate on client systems, users see certificate warnings for each SSL site they visit.On an NGFW configured as a GlobalProtect portal:This option is supported with Windows and Mac client OS versions, and requires GlobalProtect agent 3.0.0 or later to be installed on the client systems.
- Select NetworkGlobalProtectPortals and then select an existing portal configuration or Add a new one.
- Select Agent and then select an existing agent configuration or Add a new one.
- Add the self-signed trusted root CA certificate to the Trusted Root CA section. After GlobalProtect distributes the NGFW's trusted root CA certificate to client systems, the client systems trust the NGFW’s subordinate CA certificates because the clients trust the NGFW’s root CA certificate.
- Install in Local Root Certificate Store so that the GlobalProtect portal automatically distributes the certificate and installs it in the certificate store on GlobalProtect client systems.
- Click OK twice.
Without GlobalProtect:Export the NGFW trusted root CA certificate so that you can import it into client systems. Highlight the certificate and click Export at the bottom of the window. Choose the PEM format.Don’t select the Export private key checkbox. The private key should remain on the NGFW and not be exported to client systems.Import the NGFW’s trusted root CA certificate into the browser Trusted Root CA list on the client systems for the clients to trust it. When importing into the client browser, ensure that you add the certificate to the Trusted Root Certification Authorities certificate store. On Windows systems, the default import location is the Personal certificate store. You can also simplify this process by using a centralized deployment option, such as an Active Directory Group Policy Object (GPO). - Configure the Forward Untrust certificate (use the same Forward Untrust certificate for each NGFW).
- Click Generate at the bottom of the certificates page.
- Enter a Certificate Name, such as my-ssl-fwd-untrust.
- Set the Common Name, for example 192.168.2.1. Leave Signed By blank.
- Click the Certificate Authority check box to enable the NGFW to issue the certificate.
- Generate the certificate.
- Click OK to save.
- Click the new certificate to modify it and enable the Forward Untrust Certificate option.Don’t export the Forward Untrust certificate to the certificate trust lists of your network devices. Don’t install the Forward Untrust certificate on client systems. This is critical because installing the Untrust certificate in the trust list results in devices trusting websites that the NGFW does not trust. In addition, users won’t see certificate warnings for untrusted sites, so they won’t know the sites are untrusted and may access those sites, which could expose your network to threats.
- Click OK to save.
- (Optional) Configure the key size for the SSL Forward Proxy server certificates that the NGFW presents to clients.By default, the NGFW determines the key size to use based on the key size of the destination server certificate.
- Create a decryption policy rule to define criteria that traffic must match for SSL Forward Proxy decryption.
- Select PoliciesDecryption, Add or modify an existing rule, and define traffic to be decrypted.
- Select Options and:
- For the rule Action, select Decrypt.
- For Type, select SSL Forward Proxy.
- (Optional but a best practice) Configure or select an existing Decryption Profile to block and control various aspects of the decrypted traffic.For example, create a decryption profile or select one that performs certificate checks and blocks weak cipher suites and protocols from allowing questionable traffic on your network.
- Click OK to save.
- Commit your changes.
- Choose your next step:
- Enable users to opt out of SSL decryption.
- Configure decryption exclusions to disable decryption for certain types of traffic.
- (Advanced WildFire subscriptions only) Forward decrypted SSL traffic for WildFire analysis.