Decrypting encrypted traffic consumes Next-Generation Firewall (NGFW) CPU resources and can affect throughput. In general, the tighter the security (the more SSL traffic you decrypt combined with the more stringent your protocol settings), the more NGFW resources decryption consumes. Work with your Palo Alto Networks SE or CE to size your NGFW deployment and avoid sizing mistakes. Factors that affect decryption resource consumption and therefore how much traffic you can decrypt include:
The combination of the key exchange algorithm and the certificate authentication method affect throughput performance as shown in RSA and ECDSA benchmark tests . The performance cost of PFS trades off against the higher security that PFS achieves, but PFS may not be needed for all types of traffic. You can save NGFW CPU cycles by using RSA for traffic that you want to decrypt and inspect for threats but that isn't sensitive.
The combination of these factors determines how decryption consumes NGFW processing resources. To best use the NGFW's resources, understand the risks of the data you're protecting. If NGFW resources are an issue, use stronger decryption for higher-priority traffic and use less processor-intensive decryption for lower-priority traffic until you can increase the available resources. For example, you could use RSA instead of ECDHE and ECDSA for traffic that isn't sensitive or high-priority. This preserves NGFW resources for PFS-based decryption of higher priority, sensitive traffic. (You're still decrypting and inspecting the lower-priority traffic, but trading off consuming fewer computational resources with using algorithms that aren't as secure as PFS.) The key is to understand the risks of different traffic types and treat them accordingly.
Measure NGFW performance to understand the currently available resources and determine whether you need more resources to decrypt the traffic you want to decrypt. Measuring NGFW performance also sets a baseline for performance comparisons after deploying decryption. You can also run a proof of concept.
Size your NGFW deployment based on current and future needs. Include headroom for the growth of decryption traffic. Gartner predicts that through 2019, more than 80 percent of enterprise web traffic will be encrypted, and more than 50 percent of new malware campaigns will use various forms of encryption. Work with your Palo Alto Networks representatives to help you size your deployment.