Displays information about decryption sessions
and undecrypted sessions for traffic that a No Decryption profile controls,
including GlobalProtect sessions. By default, the logs show
information about unsuccessful SSL Decryption handshakes. You can
enable logging for successful SSL Decryption handshakes in Decryption
Policy rules Options. Logs display a wealth
of information that enables you to identify weak protocols and cipher
suites (key exchange, encryption, and authentication algorithms),
bypassed decryption activity, decryption failures and their causes
(e.g., incomplete certificate chain, client authentication, pinned
certificates), session end reasons, and more. For example, use the information
to determine whether you want to allow sites that use weak protocols
and algorithms. It may be better to block weak sites that you don’t
need to access for business purposes. For traffic the firewall
doesn’t decrypt and to which you apply a No Decryption profile,
the log shows sessions blocked because of server certificate verification
issues. The default Decryption Log size is 32 MB. However,
if you decrypt a lot of traffic or if you enable logging successful SSL
Decryption handshakes, you will probably need to increase the log
size ( and edit the Log Storage quotas).
If you don’t have unallocated log space, consider tradeoffs between Decryption
Log size and other log sizes. The more you log, the more resources
the logs consume. |