Palo Alto Networks firewalls offer robust decryption capabilities to inspect encrypted traffic, enhancing security by uncovering hidden threats. Below are detailed use cases and flow diagrams for each decryption method.
Use Case: Decrypt outbound SSL/TLS traffic from internal clients to external servers to inspect for threats, enforce policies, and prevent data exfiltration.
How It Works: The firewall acts as an intermediary between the client and the server, establishing separate SSL sessions with each. It presents a forged certificate to the client, signed by a trusted internal CA, allowing it to decrypt and inspect the traffic.
sequenceDiagram participant Client participant Firewall participant Server Client->>Firewall: Initiate SSL/TLS session Firewall->>Server: Initiate SSL/TLS session Server-->>Firewall: Server Certificate Firewall-->>Client: Forged Certificate (signed by internal CA) Client-->>Firewall: Encrypted Data Firewall-->>Server: Encrypted Data Note over Firewall: Decrypts and inspects traffic between Client and Server
References:
Use Case: Decrypt inbound SSL/TLS traffic destined for internal servers to inspect for threats and enforce security policies.
How It Works: The firewall requires the server's private key and certificate to decrypt the traffic. It establishes separate SSL sessions with the client and the server, allowing it to decrypt and inspect the traffic before forwarding it to the internal server.
sequenceDiagram participant Client participant Firewall participant Internal Server Client->>Firewall: Initiate SSL/TLS session Firewall->>Internal Server: Initiate SSL/TLS session Internal Server-->>Firewall: Server Certificate Firewall-->>Client: Server Certificate Client-->>Firewall: Encrypted Data Firewall-->>Internal Server: Encrypted Data Note over Firewall: Decrypts and inspects traffic between Client and Internal Server
References:
Use Case: Decrypt SSH sessions to prevent unauthorized tunneling and inspect for malicious activities within SSH traffic.
How It Works: The firewall intercepts SSH sessions, establishing separate SSH connections with the client and the server. It inspects the SSH channels to identify and block unauthorized tunneling or malicious activities.
sequenceDiagram participant SSH Client participant Firewall participant SSH Server SSH Client->>Firewall: Initiate SSH session Firewall->>SSH Server: Initiate SSH session SSH Server-->>Firewall: SSH Handshake Firewall-->>SSH Client: SSH Handshake SSH Client-->>Firewall: Encrypted Data Firewall-->>SSH Server: Encrypted Data Note over Firewall: Inspects SSH channels for unauthorized tunneling
References: