Decryption Algorithms, Resource Impact, and TLS 1.3 Caveats

This document provides an overview of decryption algorithms, their impact on resources, and specific considerations for TLS 1.3 when configuring decryption on Palo Alto Networks firewalls.

Decryption Algorithms

Key Exchange Algorithms

Encryption Algorithms

Authentication Algorithms

Resource Utilization Impact

Decrypting SSL/TLS traffic consumes CPU and memory resources on the firewall. Factors influencing resource consumption include:

It's essential to size your firewall appropriately based on the expected decryption load. For detailed guidance, refer to Palo Alto Networks' documentation on sizing firewalls for decryption requirements.

TLS 1.3 Caveats

When implementing TLS 1.3 decryption, consider the following caveats:

Ensure that your decryption profiles are configured to handle TLS 1.3 appropriately, balancing security and performance needs.

References