Decrypt and inspect inbound SSL/TLS traffic for potential threats and apply security
protections against those threats.
| Where Can I Use
This? | What Do I Need? |
|
|
No separate license required for decryption when using NGFWs or
Prisma Access.
Note: The features and capabilities available to you in
Strata Cloud Manager depend on your active license(s).
|
You can decrypt and inspect SSL/TLS traffic destined for internal servers.
SSL Inbound Inspection provides visibility
into network activity, enabling effective monitoring and handling of potentially
risky traffic that isn't outright blocked. Inbound inspection requires the
certificate and private key of each server you want to protect. To inspect SSL/TLS
traffic to internal servers, install the certificates and private keys on the
Next-Generation Firewall (
NGFW), and create decryption policy rules
for SSL Inbound Inspection.
You can associate up to 12 certificates with a single decryption policy rule. Support
for multiple certificates enables you to update server certificates without
disrupting service and protect internal servers hosting various domains, each with a
unique certificate.
To strengthen security, configure a
decryption profile that blocks sessions
using insecure protocol versions and cipher suites. Next, apply the profile to the
decryption policy rules for SSL Inbound Inspection. The
NGFW enforces
the actions defined in the decryption profile and additional profiles applied to the
rules. These may include Antivirus, Vulnerability Protection, Anti-Spyware, URL
Filtering, and File Blocking profiles.
When you configure SSL Inbound Inspection, the proxied traffic does not support
DSCP code points or QoS.