Network Security
Apply Granular Settings to Traffic Matching a Decryption Policy Rule
Table of Contents
Expand All
|
Collapse All
Network Security Docs
Apply Granular Settings to Traffic Matching a Decryption Policy Rule
Define protocol versions, algorithms, certificate verification, and other settings in
a decryption profile for traffic meeting the criteria in associated decryption policy
rules.
Where Can I Use This? | What Do I Need? |
---|---|
|
No separate license required for decryption when using NGFWs or
Prisma Access.
Note: The features and capabilities available to you in
Strata Cloud Manager depend on your active license(s).
|
Configure a decryption profile to define SSL/TLS connection settings
and apply various checks to traffic that you decrypt or exclude from decryption. Decryption
profiles provide granular control over decrypted and nondecrypted sessions, enabling
you to tailor decryption policy rules to meet specific requirements. In SSL/TLS decryption profiles, you can specify the cipher
suites you support for SSL/TLS connections and enable checks, including for
unsupported modes, failures, and certificate validity. In contrast, a no-decryption profile only verifies the validity of a
server certificate or the trustworthiness of the certificate issuer for traffic that
you intentionally don't decrypt. SSH Proxy profiles control only unsupported mode checks and
failure checks. For descriptions of each setting, see Summary of Decryption Profile Settings.
After you create a decryption profile, attach it to the appropriate decryption policy rules. Next-Generation Firewalls (NGFWs) enforce the profile settings on traffic matching all the criteria in the
rule.
If an NGFW is in FIPS-CC mode and managed by a Panorama™
management server in standard mode, a decryption profile must be created locally
on the NGFW. Decryption profiles created on Panorama in standard
mode contain references to the 3DES and
RC4 encryption algorithms and the
MD5 authentication algorithm that aren't supported
and cause pushes to managed NGFWs to fail.
Best Practices and Considerations for Decryption Profiles
- Always apply a decryption profile to decryption policy rules to protect your network against sessions with expired certificates or untrusted issuers. You can’t protect yourself against threats you can’t see.Use the strongest ciphers that you can. Weak protocols and weak algorithms contain known vulnerabilities that attackers can exploit. Set Min Version to TLSv1.3 and Max Version to Max to block weak protocols.
- Create separate decryption profiles when necessary to maximize security, and reuse them where applicable.
- For example, suppose a key partner or contractor uses legacy systems with weak protocols or algorithms. You can create a decryption profile that allows the weaker protocols or algorithms and attach it to a decryption policy rule that applies only to the relevant traffic (for example, the source IP address of the partner).
- If you need to allow client authentication, create a decryption profile with client authentication settings, and apply it only to traffic that requires client authentication.Create separate profiles with protocol settings that match the capabilities of the servers whose inbound or outbound traffic you are inspecting.
- Many mobile applications use pinned certificates. Because TLSv1.3 encrypts certificate information, the NGFW can’t automatically add these mobile applications to the SSL Decryption Exclusion List. For these applications, set the protocol Max Version to TLSv1.3, or create or apply a no-decryption policy rule to the traffic.
- For SSL Forward Proxy traffic and no-decrypt traffic (traffic that you choose not to decrypt), configure both certificate revocation list (CRL) and Online Certificate Status Revocation (OCSP) certificate revocation checks.
Best Practices By Profile Type
- Block sessions with expired certificates
- Block sessions with untrusted issuers
- Block sessions with unsupported protocol versions
- Block sessions with unsupported cipher suites
- Block sessions with client authentication (unless an important application requires it)
- Block sessions with unsupported versions
- Block unsupported cipher suites
Don’t apply a no-decryption profile to TLSv1.3 traffic. The
certificate information is encrypted, so the NGFW can’t block
sessions based on certificate information.
- Block sessions with expired certificates
- Block sessions with untrusted issuers
- Block sessions with unsupported versions
- Block sessions with unsupported algorithms
For more insights, see Deploy SSL Decryption Using Best
Practices.
Apply Granular Settings to Traffic Matching a Decryption Policy Rule (Strata Cloud Manager)
- Create a decryption profile.
- Select Manage Configuration Security Services Decryption. Under Decryption Profiles, click Add Profile.Enter a descriptive Name for the profile.Specify TLS protocol versions and cipher suites to support for TLS connections:Under Handshake Settings:
- Select a Protocol Min Version: SSLv3.0, TLSv1.0 through TLSv1.3.Select a Protocol Max Version: SSLv3.0, TLSv1.0 through TLSv1.3, and Max.Set the Protocol Max Version to Max to support the newest TLS protocol version when available.Add or Remove the desired Key Exchange Algorithms.The RSA, DHE, and ECDHE key exchange algorithms are enabled by default.To remove an algorithm, select the algorithm and then click Remove.Add or Remove the desired Encryption Algorithms.Add or Remove the desired Authentication Algorithms.The MD5 algorithm is blocked by default.(Optional) Configure Server Certificate Verification settings, Unsupported Mode Checks, Failure Checks, and Client Extension settings for SSL Forward Proxy.
- For Server Certificate Verification, select Block sessions with expired certificates or Block sessions with untrusted issuers.For Unsupported Mode Checks, select Block sessions with unsupported versions or Block sessions with unsupported cipher suites.(Optional) To configure additional Server Certificate Verification settings, Unsupported Mode Checks, Failure Checks, and Client Extension settings, select Advanced.An Advanced SSL Forward Proxy Settings overlay opens.
- For Server Certificate Verification, you can configure these additional settings:
- Block sessions with unknown certificate status
- Block sessions on certificate status check timeout
- Restrict certificate extensions
- Append certificate's CN value to SAN extension
- For Unsupported Mode Checks, you can Block sessions with client authentication.
- For Failure Checks, you can Block downgrade on no resource.
- For Client Extension, you can Strip ALPN.
Save the advanced settings.(Optional) Configure Unsupported Mode Checks and Failure Checks for SSL Inbound Inspection.- For Unsupported Mode Checks, select Block sessions with unsupported versions or Block sessions with unsupported cipher suites.For Failure Checks, select Block sessions if resources not available or Block sessions if HSM not available.(Optional) Configure Server Certificate Verification settings for traffic you don't decrypt.For Server Certificate Verification, select Block sessions with expired certificates or Block sessions with untrusted issuers.Apply no-decryption profiles to decryption policy rules that control traffic excluded from decryption for compliance, legal, and nontechnical reasons. If a server breaks decryption for technical reasons, add it to the Global Decryption Exclusion list instead.Save the profile.Commit your changes.Select Push ConfigPush.Apply the profile to the appropriate decryption policy rules.
Apply Granular Settings to Traffic Matching a Decryption Policy Rule (PAN-OS & Panorama)
- Create a decryption profile.
- Select ObjectsDecryption Profile, and then click Add.Enter a descriptive Name.(Optional) To make the profile available across all virtual systems on an NGFW or each Panorama device group, select Shared.(Decryption Mirroring Only) Enable an Ethernet Interface to use to copy and forward decrypted traffic.Separate from this task, follow the steps to configure Decryption Port Mirroring. Be aware of local privacy regulations that prohibit mirroring or control the type of traffic that you can mirror. Decryption Port Mirroring requires a Decryption Port Mirroring license.(Optional) Enable various checks, and configure TLS connection parameters.For descriptions of these settings, see Summary of Decryption Profile Settings.
- Select SSL Decryption, and then select either SSL Forward Proxy or SSL Inbound Inspection.
- Configure Server Certificate Verification, Unsupported Mode Checks, Failure Checks, and Client Extension settings for SSL Forward Proxy.
- Configure Unsupported Mode Checks and Failure Checks for SSL Inbound Inspection.
Specify TLS protocol versions and cipher suites to support for TLS connections:- Select SSL Protocol Settings.
- For Protocol Versions, select a Min Version and a Max Version.Set the Max Version to Max to support the newest TLS protocol version when available.
- Enable or disable the desired Key Exchange Algorithms. The RSA, DHE, and ECDHE key exchange algorithms are enabled by default.
- Enable or disable the desired Encryption Algorithms.
- Enable or disable the desired Authentication Algorithms.The MD5 algorithm is blocked by default.
(Optional) Configure Server Certificate Verification settings for traffic you don't decrypt.Apply no-decryption profiles to decryption policy rules that control traffic excluded from decryption for compliance, legal, and nontechnical reasons. If a server breaks decryption for technical reasons, add it to the SSL Decryption Exclusion list (DeviceCertificate ManagementSSL Decryption Exclusion) instead.- Select No Decryption.Enable Block sessions with expired certificates or Block sessions with untrusted issuers.(Optional) Configure Unsupported Mode Checks and Failure Checks for SSH traffic.
- Select SSH Proxy.For Unsupported Mode Checks, enable Block sessions with unsupported versions or Block sessions with unsupported algorithms.For Failure Checks, enable Block sessions on SSH errors or Block sessions if resources not available.Apply the profile to the appropriate decryption policy rules.Commit your configuration.