Preparing for Decryption Deployment

Introduction: Why Plan?

Successfully deploying SSL/TLS or SSH decryption involves more than just configuring firewall policies. Careful planning is essential to ensure the deployment meets security goals without disrupting users or violating regulations. Key preparation steps involve stakeholder alignment, developing a clear strategy, managing certificates (PKI), correctly sizing hardware, and executing a phased rollout.

Goal: Decrypt as much traffic as feasible to maximize visibility and threat prevention, while respecting technical limitations, performance constraints, and policy/legal requirements.

Prerequisite: Migrate from port-based to application-based (App-ID) Security policy rules *before* deploying Decryption policy. This prevents conflicts where decrypted traffic might be blocked because its actual application port differs from the original port-based rule's expectation.

Phase 1: Strategy Development with Stakeholders

Effective decryption requires buy-in and input from various departments:

Key Strategic Decisions:

  1. Define Scope & Priorities:
    • Identify critical internal servers needing protection (Inbound Inspection candidates).
    • Categorize outbound traffic by risk (e.g., High-Risk URL categories, unclassified sites) and business need.
    • Prioritize decryption for the highest risk traffic first, especially if firewall resources are constrained. Ask: "What's the impact if this encrypted traffic contains malware?"
  2. Identify Technical Exclusions:
    • Proactively test or research applications/sites known to use certificate pinning or require mutual authentication, which inherently break Forward Proxy decryption.
    • Identify destinations using unsupported ciphers or protocols that cannot be decrypted.
    • For business-critical sites that break decryption technically, add them to the global SSL Decryption Exclusion List (Device > Setup > Session > Decryption Settings). This list is *only* for technical exclusions.
  3. Identify Policy-Based Exclusions:
    • Determine traffic categories that should *not* be decrypted due to privacy, legal, or policy reasons (e.g., Financial Services, Health and Medicine).
    • Create specific Decryption Policy rules with a "No Decrypt" action for these categories.
    • Attach a "No Decryption" Decryption Profile to these rules to perform basic certificate validation (block expired/untrusted CAs) for TLS 1.2 and earlier traffic, adding a layer of security even without full decryption.
  4. Handle Guest & BYOD Traffic:
    • **Best:** Isolate these networks. If no corporate access is needed, direct them straight to the internet without decryption.
    • **If corporate access needed:** Decrypt their traffic. This requires a method (e.g., Captive Portal, instructions) for users to trust the firewall's Forward Trust CA. Update usage policies accordingly. Apply strict Security Policies.
    • **If decryption legally prohibited:** Isolate the network segment, apply strict Security Policies (App-ID, URL Filtering, Threat Prevention), and use a "No Decrypt" policy rule with a profile to block connections with invalid certificates (for TLS 1.2-).
  5. Define Logging Strategy: Determine which decryption events (successes, failures, exclusions) to log and forward, considering storage capacity and compliance requirements. Securely store forwarded logs.

Decryption Decision Flow

graph TD
    A[Traffic Matches Security Policy 'Allow'] --> B{Decryption Policy Match?};
    B -- Yes --> C{Action: Decrypt?};
    B -- No --> Z[Allow Undecrypted];
    C -- Yes --> D[Technically Possible? No Pinning mTLS Unsupported Cipher...];
    C -- No --> E[Action: No Decrypt];
    D -- Yes --> F[Decrypt Traffic];
    D -- No --> G{Check Global Exclusion List};
    G -- Yes --> Z;
    G -- No --> H[Block/Drop Session];
    E -- Apply Checks --> I{Certificate Valid? If Profiled};
    I -- Yes --> Z;
    I -- No --> H;
    F --> J[Inspect Cleartext App-ID Threat URL...] --> K[Re-encrypt & Forward];

    style Z fill:#dff0d8,stroke:#3c763d,stroke-width:2px;
    style H fill:#f2dede,stroke:#a94442,stroke-width:2px;

        

Phase 2: Public Key Infrastructure (PKI) Planning

SSL Forward Proxy requires the firewall to dynamically create certificates impersonating the destination server, signed by a CA that internal clients trust. Planning your PKI strategy is critical:

Critical: Never distribute or trust the Forward Untrust CA certificate on client devices. Its purpose is to generate warnings for untrusted sites.

Consider using a Hardware Security Module (HSM) for enhanced protection of the private keys associated with your Forward Trust CA(s).

Phase 3: Firewall Sizing for Decryption

Decryption adds computational load to the firewall's dataplane, impacting throughput and session capacity. Accurate sizing is essential to avoid performance degradation.

Factors Affecting Performance:

Sizing Strategy:

Phase 4: Staged Rollout and User Education

Deploying decryption should be gradual and well-communicated:

  1. User Education & Policy Updates: Inform all users (employees, contractors, guests if applicable) about the decryption process, why it's necessary, and how it might affect their browsing (e.g., potential warnings for untrusted sites, blocking of certain sites). Update acceptable use policies.
  2. Pilot/POC Phase:
    • Select a small group of early adopters or IT staff for initial testing.
    • Deploy decryption policies for this group, starting with high-risk categories or specific applications.
    • Gather feedback on user experience, website compatibility issues, and performance.
    • Identify sites/apps requiring technical exclusions and add them to the global exclusion list.
    • Refine Decryption Profiles and Policies based on findings.
    • Test support procedures.
  3. Phased Production Rollout:
    • Gradually expand decryption to larger user groups or more URL categories/applications.
    • Monitor firewall performance (CPU, memory, session capacity) closely at each stage.
    • Monitor logs (Decryption, Traffic, URL Filtering) for errors or unexpected blocks.
    • Communicate clearly with users during each phase.
    • Adjust policies and exclusions as needed.
  4. Ongoing Maintenance: Regularly review decryption logs, exclusion lists, and performance metrics. Update policies and profiles as needed for new applications, threats, or changing requirements.

Consider enabling the "SSL Decryption Opt-Out" feature if required by policy, allowing users encountering issues (or accessing sensitive personal sites) to temporarily bypass decryption after acknowledging a warning.

Decryption Planning & Deployment Quiz

1. Which two benefits come from assigning a Decryption Profile to a Decryption policy rule with a “No Decrypt” action? (Choose two.)

2. What are three valid technical reasons for excluding a site from SSL decryption using the global exclusion list? (Choose three.)

3. During SSL decryption, which three factors most significantly affect firewall resource consumption? (Choose three.)

4. An engineer must configure a new SSL decryption deployment. Which profile or certificate is fundamentally required before any traffic matching an SSL *Forward Proxy* decryption rule can be decrypted?

5. What are two common *policy* reasons (not technical) to use a "No Decrypt" action to exclude traffic from SSL decryption? (Choose two.)

6. In SSL Forward Proxy decryption, which two types of certificates can be validly configured as the Forward Trust certificate used for signing impersonation certificates? (Choose two.)

7. As a best practice when starting a phased SSL decryption rollout, which URL category should generally be targeted first?

8. When planning to configure SSL Forward Proxy on a PA-5260, a user asks how SSL decryption can be implemented using a phased approach in alignment with Palo Alto Networks best practices. What should you recommend as a starting point?

9. The administrator for a small company has enabled decryption using a self-signed root certificate and configured Forward Trust/Untrust certificates. The admin has NOT yet installed this self-signed root certificate onto client systems. What will end-users experience?

10. During decryption testing, several essential business websites are found to be blocked because they use unsupported ciphers. How should the engineer allow access to these specific sites while maintaining strong security for other traffic?

11. A network security engineer wants to prevent resource-consumption issues on the firewall while decrypting. Which strategy aligns with best practices for performance?

12. A network administrator wants to deploy SSL Inbound Inspection to protect an internal web server. What two certificate components must be imported onto the firewall for the specific server being protected? (Choose two.)

13. A Firewall Engineer is migrating a legacy port-based firewall policy to a Palo Alto Networks firewall and plans to implement SSL decryption later. What is the recommended order of operations?

14. During the implementation of SSL Forward Proxy decryption, an administrator imports the company’s Enterprise Root CA and Intermediate CA certificates onto the firewall. The Root and Intermediate CAs are also distributed to clients. Which approach should be used for the Forward Trust and Forward Untrust certificates?

15. An engineer uses a Forward Trust certificate from the enterprise PKI expiring Dec 31, 2025, for SSL Forward Proxy. When the firewall generates an impersonation certificate for a website, what expiry date will that impersonation certificate have?

16. A network security administrator wants to inspect bulk user HTTPS traffic egressing the internet edge. Which type of certificate is the best choice to configure as the SSL Forward Trust certificate?

17. An administrator has been tasked with deploying SSL Forward Proxy. Which two types of certificates are typically *used* by the firewall to perform the decryption and signing process? (Choose two.)

18. Which two factors should be primarily considered when sizing a firewall for a decryption deployment? (Choose two.)