Decryption policy rules granularly define the traffic to decrypt or not to decrypt
based on the source, destination, service (application port), and URL category.
No separate license required for decryption when using NGFWs or
Prisma Access.
Note: The features and capabilities available to you in
Strata Cloud Manager depend on your active license(s).
Decryption policy rules define the traffic that you decrypt or do not
decrypt. You can craft granular rules based on network and policy objects, including source,
destination, service (application port), URL category, and users. Decryption policy
rules also define the type of decryption performed: SSL Forward Proxy, SSL Inbound Inspection, or SSH Proxy. Additionally, you can enable
Decryption Mirroring, decryption log
settings, and additional controls, such as checks for expired certificates by
applying a decryption profile to a rule.
Best Practices and Considerations for Decryption Policy Rules
Strike a balance between thorough inspection and efficient performance,
compliance, security, and resource management. Decrypting all traffic
indiscriminately can be resource-intensive. For example, if Next-Generation
Firewall (NGFW) performance and sizing are major considerations, you
might prioritize the decryption and inspection of traffic to high- or medium-risk
URL categories, traffic destined for
critical servers, or business-critical traffic. Evaluate the potential impacts of
decryption on major applications or servers.
In another case, you might decide not to decrypt the traffic of high-level business
executives. You can do so by creating a no-decrypt decryption policy rule with the
executive's User-ID as a source.
Create targeted decryption policy rules for different network segments and user
groups. Different segments of the network may have varying levels of risk
and security requirements. For example, traffic between external networks and
internal zones typically requires stricter scrutiny. Decrypting traffic selectively
allows the implementation of customized security policies that provide appropriate
levels of protection without compromising performance or privacy for other users.
Use the controls available to create targeted decryption policy rules that take into
account the most important factors to you. You might even update your decryption
policy rules to optimize troubleshooting efforts.
Create rules that are as specific or general as needed and order them
appropriately. Many Palo Alto Networks services rely on decryption. Clearly
define which types of traffic should be decrypted, ensuring that the rules are
specific enough to be effective but broad enough to cover necessary use cases.
Place rules that exclude traffic from decryption
at the top. Decryption policy rules are compared against the traffic in
sequence.
Decryption policy rules are evaluated from top to bottom; more specific rules
must precede more general rules.
For granular control over how the traffic is decrypted, such as invoking checks
for server certificates, unsupported modes, and failures, configure a decryption profile and attach it to decryption policy
rules.
Block known dangerous URL filtering categories such as
malware, phishing, dynamic-dns, unknown, command-and-control,
proxy-avoidance-and-anonymizers, copyright-infringement, extremism,
newly-registered-domain, grayware, and parked. If you must allow any of
these categories for business reasons, decrypt them and apply strict
Security profiles to the traffic.
URL categories that you should always decrypt if you allow them include:
online-storage-and-backup, web-based-email, web-hosting,
personal-sites-and-blogs, and content-delivery-networks.
In Security policy rules, block the Quick UDP Internet Connections (QUIC)
protocol unless you want to allow encrypted browser traffic for business
reasons. Chrome and some other browsers establish sessions using QUIC
instead of TLS. QUIC uses proprietary encryption that NGFWs
can’t decrypt, so potentially dangerous traffic may enter the network as
encrypted traffic. Blocking QUIC forces the browser to fall back to TLS and
enables de ryption of the traffic.
Create a Security policy rule that blocks QUIC on its UDP service ports (80
and 443) and create a separate rule that blocks the QUIC application. For
the rule that blocks UDP ports 80 and 443, create a Service that includes UDP
ports 80 and 443.
Before creating a decryption policy rule, understand that the set of IPv4
addresses is treated as a subset of the set of IPv6 addresses, as described
in detail in Policy.
Select Manage Configuration NGFW and Prisma Access Security Services Decryption.
In the Decryption Policies section, click Add
Rule.
Provide basic information to identify the rule.
Enter a descriptive Name.
(Optional) Enter a Description of the
rule.
(Optional) Select a Position.
(Optional) Select Tags.
Specify match criteria based on network and policy objects.
A rule only applies to traffic that matches all specified criteria.
Configure the following Source and Destination settings to enforce
traffic based on its origin or where it terminates:
Zones—Click Add Zones,
then select existing Zones (for
example, Internet), or click the down
arrow and select Any Zone. You can
also create a zone.
Addresses—Click Add
Addresses, then select existing
Addresses, or click the down
arrow and select Any Address. You can
also add Address Groups,
External Dynamic
Lists, and Regions, or
(Destination section) SaaS Application
Endpoints.
To exclude Address objects from decryption:
Specify at least one address, address group, external
dynamic list, or region.
Select Exclude (Negate).
Users—Click Add User
Groups or Add Users,
then select existing user groups or local users, or click
Add Local User Groups or
Add Local Users to create new
user groups or users.
You can also decrypt traffic for Any
User or certain types of users:
Match pre-logon (users who are
connected to GlobalProtect but are not yet logged in),
Match known-user, or
Match unknown.
Devices—Click Add Device Profiles
or (Source section) Add HIP
Profiles, then select existing profiles or in
the case of HIP Profiles, create a Host Information
profile. You can also select Any or
Match no-hip.
Configure Services and URLs settings to match traffic based on
service (port and protocols) or URL categories:
Service Entities—Click Add
Services or Add Service
Groups, then either select existing services
or service groups or click Create New
to create a new entity.
By default, decryption policy rules decrypt any traffic on
TCP and UDP ports. However, you can click the down arrow and
select Any Service, if necessary. To
match applications on the default application ports, click
the down arrow and select
application-default.
The application-default setting can be useful when you
create a policy-based
decryption exclusion. You can exclude
applications running on their default ports from
decryption, while continuing to decrypt the same
applications if they are detected on nonstandard
ports.
URL Category Entities—Click Add URL
Categories, then select existing URL categories or
click Create New. To apply the rule to
any URL category, click the down arrow and select Any
URL Category. You can also Add
External Dynamic Lists and SaaS
Application Endpoints. To create a new external
dynamic list while configuring the rule, click Create
New.
Specify how traffic that matches the rule is handled.
In the Action and Advanced Inspection section, for
Action, select either
Decrypt or Do Not
Decrypt.
If you selected Decrypt, select a decryption
Type:
SSL Inbound
Inspection. Then, Add one
or more Certificates for the internal
server you want to protect. Decryption policy rules for SSL
Inbound Inspection support a maximum of 12 certificates.
You can decrypt SSL/TLS traffic bound for an internal
server that hosts multiple domains, each domain with its
own certificate. The NGFW negotiates
SSL/TLS connections using the certificate in your policy
rule that matches the one the server presents for the
requested URL.
To update certificates for protected internal servers
without incurring downtime, renew or obtain a new server
certificate before it expires or otherwise becomes
invalid. Then, import the certificate and private key
onto your NGFW or Strata Cloud Manager,
add it to an SSL Inbound Inspection policy rule before
installing the same certificate onto your web server.
Updating your policy rule with a new certificate while
another is active on your web server prepares the NGFW to decrypt traffic to the server
regardless of the certificate in use. Configure SSL Inbound
Inspection describes this process
further.
(Optional) Enforce TLS and Certificate
Validation.
(Optional) Apply a decryption profile
to block and control various aspects of traffic governed by the
decryption policy rule.
Although optional, always apply a decryption profile to
decryption policy rules to protect your network against
encrypted threats. You can’t protect yourself against threats
you can’t see.
For SSL decryption, you can define the TLS protocol versions, key
exchange algorithms, encryption algorithms, and authentication
algorithms allowed for SSL Forward Proxy and SSL Inbound Inspection
connections. You can also block sessions with weak protocol
versions, expired certificates, and other options.
The profile settings the NGFW applies to matching
traffic depends on the policy rule action (Decrypt or Do Not
Decrypt) and decryption type (SSL Forward Proxy and SSL Inbound
Inspection). This allows you to use the different decryption
profiles with different types of decryption policy rules that apply
to different types of traffic and users.
Add sites that break decryption for technical reasons such as pinned
certificates or mutual authentication to the SSL decryption exclusion
list.
Define Traffic to Decrypt (PAN-OS & Panorama)
Add a new decryption policy rule.
Select PoliciesDecryption, Add a new decryption policy rule, and
give the policy rule a descriptive Name.
Configure the decryption rule to match to traffic based on network and policy objects:
Firewall security zones—Select Source
or Destination and match to traffic based on
the Source Zone or Destination
Zone.
IP addresses, address objects, or address groups—Select
Source or
Destination to match to traffic based on
the Source Address or the
Destination Address. Alternatively,
select Negate to exclude the source address
list from decryption.
Users—Select Source and set the
Source User for whom to decrypt traffic.
You can decrypt specific user or group traffic or decrypt traffic
for certain types of users, such as unknown users or pre-logon users
(users who are connected to GlobalProtect but are not yet logged
in).
Ports and protocols—Select Service/URL
Category to set the rule to match to traffic based
on service. By default, the policy rule is set to decrypt
Any traffic on TCP and UDP ports. You can
Add a service or a service group, and
optionally set the rule to
application-default to match to
applications only on the application default ports.
The application-default setting can be useful when you create a policy-based decryption
exclusion. You can exclude applications running on their
default ports from decryption, while continuing to decrypt the same
applications when they are detected on nonstandard ports.
URLs and URL categories—Select Service/URL Category and
decrypt traffic based on:
An externally hosted list of URLs that the NGFW retrieves for policy-enforcement (see ObjectsExternal Dynamic Lists).
Palo Alto Networks predefined URL categories,
which make it easy to decrypt entire categories of allowed
traffic. This option is also useful when you create
policy-based decryption exclusions because you can exclude
sensitive sites by category instead of individually. For
example, although you can create a custom URL category to
group sites that you do not want to decrypt, you can also
exclude financial or healthcare-related sites from
decryption based on the predefined Palo Alto Networks URL
categories. In addition, you can block risky URL categories
and create comfort
pages to communicate the reason the sites are
blocked, or enable users to opt out
of SSL decryption.
You can use the predefined high-risk and medium-risk URL
categories to create a decryption policy rule that decrypts
all high-risk and medium-risk URL traffic. Place the rule at
the bottom of the rulebase (all decryption exceptions must
be above this rule so that you don’t decrypt sensitive
information) as a safety net to ensure that you decrypt and
inspect all risky traffic. However, if high-risk or
medium-risk sites to which you allow access contain
personally identifiable information (PII) or other sensitive
information that you don’t want to decrypt, either block
those sites to avoid allowing encrypted risky traffic while
also avoiding privacy issues or create a no- decrypt policy
rule to handle the sensitive traffic.
Custom URL categories (see ObjectsCustom ObjectsURL Category). For example, you can create a custom URL
category to specify a group of sites you need to access for
business purposes but that don't support the safest
protocols and algorithms, and then apply a customized
decryption profile to allow the weaker protocols and
algorithms for just those sites (that way, you don’t
decrease security by downgrading the decryption profile you
use for most sites).
Set the rule to either decrypt matching traffic or to exclude matching traffic
from decryption.
SSL Inbound
Inspection. Then, Add one
or more Certificates for the
destination internal server of the inbound SSL traffic. SSL
Inbound Inspection policy rules support a maximum of 12
certificates.
You can configure a decryption policy rule to decrypt
SSL/TLS traffic bound for an internal server that hosts
multiple domains, each domain with its own certificate.
The NGFW negotiates SSL/TLS connections
using the certificate in your policy rule that matches
the one the server presents for the requested URL.
To update certificates for protected internal servers
without incurring downtime, renew or obtain a new server
certificate before it expires or otherwise becomes
invalid. Then, import the certificate and private key
onto your NGFW or Strata Cloud Manager,
add it to an SSL Inbound Inspection policy rule before
installing the same certificate onto your web server.
Updating your policy rule with a new certificate while
another is active on your web server prepares the NGFW to decrypt traffic to the server
regardless of the certificate in use. Configure SSL Inbound
Inspection describes this process
further.
(Panorama ™) Support for multiple
certificates in SSL Inbound Inspection policy rules is
unavailable in PAN-OS® versions earlier than
PAN-OS 10.2. If you push an SSL Inbound Inspection
policy rule with multiple certificates from a Panorama
management server running PAN-OS 10.2 to a NGFW running an earlier version, the
policy rule on the managed NGFW inherits
only the first certificate from the alphabetically
sorted list of certificates.
Before pushing your decryption policy rule from Panorama,
we recommend you set up different templates or
device groups
for NGFWs running PAN-OS 10.1 and earlier
to ensure you push the correct
policy rule and certificate to the
appropriate NGFWs.
Apply a no-decryption profile to
undecrypted traffic to block sessions with expired certificates and
untrusted issuers. Just because you don't decrypt the traffic does not
mean you should let just any undecrypted traffic on your network. Server
certificate checks help with this.
(Optional) Select a Decryption Profile to
perform additional checks on traffic that matches the policy rule.
Although optional, always apply a decryption profile to decryption policy
rules to protect your network against encrypted threats. You can’t
protect yourself against threats you can’t see.
Create a decryption policy rule or open an existing rule to modify
it.
Select Options and select a
Decryption Profile to block and control
various aspects of the traffic matched to the rule.
The profile rule settings applied to matching traffic depends on the
policy rule Action (Decrypt or No Decrypt)
and the policy rule Type (SSL Forward Proxy,
SSL Inbound Inspection, or SSH Proxy). This allows you to use the
different decryption profiles with different types of decryption
policy rules that apply to different types of traffic and users.
Click OK.
Configure decryption logging
(configure whether to log both successful and unsuccessful TLS handshakes and
configure decryption log forwarding).
Create policy-based decryption exclusions for
traffic you choose not to decrypt and add sites that break
decryption for technical reasons such as pinned certificates or mutual
authentication to the SSL decryption exclusion
list.