Configure SSH Proxy on Palo Alto Networks Firewall

SSH Proxy decryption allows the firewall to decrypt and inspect SSH traffic, preventing the misuse of SSH tunnels for malicious purposes. Below are the steps to configure SSH Proxy on PAN-OS 11.0.

Prerequisites

Configuration Steps

  1. Verify Interface Types:
  2. Create a Decryption Policy Rule:
  3. Commit the Configuration:
  4. Optional - Configure Decryption Exclusions:

SSH Proxy Overview

For more detailed information, refer to the official documentation: SSH Proxy - Palo Alto Networks

Important Considerations

SSH Proxy Flow Diagram

sequenceDiagram participant Client participant Firewall participant Server Client->>Firewall: Initiate SSH connection Firewall->>Server: Establish SSH session Server-->>Firewall: SSH response Firewall-->>Client: Forward SSH response loop SSH Session Client->>Firewall: Send SSH data Firewall->>Server: Forward SSH data Server-->>Firewall: SSH response Firewall-->>Client: Forward SSH response end

References