Palo Alto Networks Decryption Concepts

Introduction to Decryption

The Transport Layer Security (TLS) protocol (evolved from Secure Sockets Layer (SSL) ) and the Secure Shell (SSH) protocol are fundamental for securing network communications. SSL/TLS typically secures web traffic (HTTPS), while SSH secures remote access. Both rely on public/private key cryptography to encrypt data, rendering it unreadable to unauthorized parties.

However, this encryption can be exploited by attackers to hide malicious activities. For instance, malware delivered via an HTTPS site can infect users and spread laterally within a network, undetected by security tools that don't inspect encrypted traffic. Therefore, encrypted traffic should not be implicitly trusted.

Decryption is the process of converting this encrypted data back to its original, readable format. This allows Palo Alto Networks Next-Generation Firewalls (NGFWs) and Prisma Access to inspect the content for threats, enforce policies, and ensure compliance.

Why Decrypt Traffic?

Decrypting SSL/TLS and SSH traffic enables security platforms to:

SSL/TLS Decryption Fundamentals

SSL/TLS decryption positions the NGFW as a trusted intermediary (often called a "man-in-the-middle" or proxy) between the client and the server. This involves establishing two separate secure sessions:

  1. Client <===> NGFW
  2. NGFW <===> Server

The NGFW uses certificates and keys to manage these sessions transparently. The client believes it's directly connected to the server, and the server believes it's directly connected to the client. This allows the NGFW to decrypt the traffic, apply security inspection (Threat Prevention, URL Filtering, etc.), and then re-encrypt it before forwarding it to the destination.

There are two primary modes for SSL/TLS decryption:

Decryption relies heavily on certificate management and trust relationships.

Note: Because the NGFW acts as a proxy, certain scenarios like connections requiring client authentication or using pinned certificates cannot be decrypted using these methods. Also, High Availability (HA) synchronization of decrypted sessions is not supported; new sessions post-failover will be decrypted according to policy.

SSH Decryption (SSH Proxy)

SSH Proxy allows the NGFW to decrypt and inspect SSH traffic. Unlike SSL/TLS, SSH decryption doesn't typically rely on certificates presented to the client/server. Instead, the NGFW uses an internally generated key pair to proxy the connection.

The primary goal of SSH Proxy is to prevent malicious use of SSH tunneling (port forwarding), where attackers might hide forbidden applications or exfiltrate data within an allowed SSH connection. The NGFW uses App-ID to identify the type of channel within the SSH session:

You configure SSH Proxy via Decryption Policy rules, often blocking the ssh-tunnel application while allowing the base ssh application.

Note: SSH decryption can interfere with SSH key-based authentication, as the client can no longer directly verify the server's public key. Username/password authentication should be used, or specific servers requiring key-based auth must be excluded from SSH decryption policy.

Keys and Certificates for Decryption

SSL/TLS decryption requires careful management of digital certificates and cryptographic keys.

Certificate Types in Palo Alto Networks Decryption:

Certificate Type Description & Use Case
Forward Trust Certificate A CA certificate (can be self-signed or issued by an internal enterprise PKI) configured on the NGFW. Used in SSL Forward Proxy to re-sign server certificates from websites that the NGFW *trusts*. The client's browser must trust this Forward Trust CA.
Forward Untrust Certificate A certificate (typically self-signed) configured on the NGFW. Used in SSL Forward Proxy to re-sign server certificates from websites that the NGFW *does not* trust (e.g., expired, self-signed, unknown CA). This intentionally presents a warning to the end-user's browser.
SSL Inbound Inspection Certificate(s) The actual server certificate(s) (including the private key) for your internal servers that you want to protect. These are imported onto the NGFW and used in SSL Inbound Inspection policies. If intermediate CAs are involved, the full chain should often be imported.
Server Certificate (General) The certificate presented by any web server during a TLS handshake. The NGFW validates this against its trusted CA list.
Root CA / Intermediate CA Certificates that form the chain of trust. The Root CA is implicitly trusted. Intermediate CAs are signed by the Root or another Intermediate, eventually signing the end-entity (server) certificate.

Key Considerations:

Decryption Profiles

Decryption Profiles are attached to Decryption Policy rules and define *how* the firewall handles specific aspects of the SSL/TLS or SSH session, especially regarding security checks and protocol parameters. They allow granular control over decrypted traffic.

Key Functions Controlled by Decryption Profiles:

Types of Decryption Profiles:

Decryption Profile Best Practices:

Profile Settings vs. Profile Types Matrix:

Profile Settings and Profile Types Matrix
Settings
Profile Types
SSL Forward Proxy SSL Inbound Inspection SSH Proxy No Decryption
Server Certificate Verification Block sessions with expired certificates Yes No No Yes
Block sessions with untrusted issuers Yes No No Yes
Block sessions with unknown certificate status Yes No No No
Block sessions on SNI mismatch with Server Certificate (SAN/CN) Yes No No No
Block sessions on certificate status check timeout Yes No No No
Restrict certificate extensions Yes No No No
Append certificate’s CN value to SAN extension Yes No No No
Unsupported Mode Checks Block sessions with unsupported versions Yes Yes Yes No
Block sessions with unsupported cipher suites Yes Yes Yes No
Block sessions with unsupported algorithms No No Yes No
Block sessions with client authentication Yes No No No
Failure Checks Block sessions if resources not available Yes Yes Yes No
Block sessions if HSM not available Yes Yes No No
Block downgrade on no resource Yes Yes No No
Block sessions on SSH errors No No Yes No

Decryption Types Detailed

SSL Forward Proxy

This mode is used to decrypt and inspect outbound traffic initiated by internal users connecting to external websites/services. The NGFW acts as a proxy, intercepting the client's connection attempt and establishing separate secure sessions with both the client and the destination server.

Process Flow:

  1. Client initiates TLS connection to external server.
  2. NGFW intercepts the request.
  3. NGFW initiates its own TLS connection to the external server (acting as the client).
  4. Server sends its certificate to the NGFW.
  5. NGFW validates the server certificate against its trusted CA list.
    • If trusted: NGFW generates an impersonation certificate using the Forward Trust CA and sends it to the client.
    • If untrusted: NGFW generates an impersonation certificate using the Forward Untrust CA and sends it to the client (triggering a browser warning).
  6. Client validates the impersonation certificate (it must trust the Forward Trust CA).
  7. NGFW proxies the key exchange between client and server, gaining access to the session keys.
  8. NGFW decrypts traffic, inspects it according to policy, re-encrypts, and forwards.

SSL Forward Proxy process diagram

SSL Forward Proxy traffic does not support DSCP QoS marking preservation.

SSL Inbound Inspection

This mode decrypts and inspects inbound traffic destined for internal servers (e.g., company web servers) initiated by external clients. It allows the NGFW to detect threats targeting internal resources.

Requirements:

Process Flow:

  1. External client initiates TLS connection to internal server's public IP.
  2. NGFW intercepts the connection (often via NAT).
  3. NGFW uses the imported server certificate/key to establish the TLS session with the client (acting as the server).
  4. NGFW establishes a separate (often unencrypted, but can be TLS) session to the actual internal server.
  5. NGFW decrypts client traffic, inspects according to policy, potentially re-encrypts (if backend connection is TLS), and forwards to the internal server. Replies are processed in reverse.

If the server certificate involves intermediate CAs, the full chain should usually be uploaded to the NGFW to avoid client validation issues, especially pre-TLSv1.3.

SSL Inbound Inspection traffic does not support DSCP QoS marking preservation.

SSL Inbound Inspection Profile settings screenshot

SSH Proxy

Used to decrypt and control SSH sessions, primarily to prevent SSH tunneling.

Process Flow:

  1. Client initiates SSH connection to server.
  2. NGFW intercepts the request.
  3. NGFW initiates its own SSH session to the server (acting as client).
  4. Server responds; NGFW intercepts.
  5. NGFW uses its internally generated SSH key pair to establish an SSH session with the original client (acting as server).
  6. NGFW proxies traffic between the two established SSH sessions.
  7. NGFW uses App-ID to inspect the channel type within the SSH connection. If tunneling (X11, forwarded-tcpip, direct-tcpip) is detected, it blocks the tunneled traffic based on policy. Regular SSH session traffic (SFTP, SCP, shell) is allowed if permitted by policy.

SSH Proxy process diagram

SSH Proxy traffic does not support DSCP QoS marking preservation.

TLS 1.3 Decryption

TLS 1.3 enhances security and performance over previous versions. Palo Alto Networks platforms support TLS 1.3 decryption for SSL Forward Proxy, SSL Inbound Inspection, Network Packet Broker, and Decryption Port Mirroring.

Key Differences/Considerations for TLS 1.3:

Configuration:

SSL Protocol Settings screenshot

Decryption Broker

The Decryption Broker feature allows the Palo Alto Networks NGFW or Prisma Access to forward a copy of decrypted traffic to a series of third-party security services (like specialized Intrusion Prevention Systems (IPS), Data Loss Prevention (DLP) tools, or custom sandboxes) for additional inspection. This enables organizations to leverage existing security investments or specialized tools that require cleartext visibility.

Unlike Decryption Mirror which simply sends a one-way copy, Decryption Broker typically sends traffic *through* a security chain and expects the traffic to be returned to the firewall for final forwarding to its original destination.

Key Characteristics:

Deployment Modes (Security Chains):

Decryption Broker supports two main ways to integrate the external tools:

Automatic Decryption Bypasses & Exclusions

While Decryption Policies and Profiles define the *intended* scope of decryption, certain technical characteristics encountered during the SSL/TLS handshake can force the firewall to automatically bypass decryption for specific sessions, even if a "decrypt" action is configured in the matching policy rule. This typically happens when the firewall, acting as a proxy, cannot fulfill specific security requirements of the client or server application.

Common Scenarios for Automatic Bypass:

Handling and Visibility:

Distinction from Manual Exclusions: This automatic bypassing behavior based on handshake requirements or failures is different from:

  • Policy-Based Exclusions: Using a Decryption Policy rule with a "No Decrypt" action (often combined with a No-Decrypt Profile for basic checks).
  • Global Decryption Exclusion List: Manually adding specific server hostnames or IPs to the exclusion list under Device > Setup > Session > Decryption Settings , typically used for known incompatible sites (often due to pinning or technical reasons found during testing).

Automatic bypasses occur because the firewall *cannot* technically perform the decryption as requested by policy, while manual exclusions are configured because the administrator *chooses* not to decrypt.

Configuration Overview:

  1. Install the required Decryption Broker license.
  2. Configure dedicated physical or AE interfaces for the security chain (assigning IPs for Layer 3, or pairing them for Transparent Bridge). Assign these interfaces to appropriate Security Zones.
  3. Navigate to Device > Decryption Broker to define the security chain(s), specifying the interfaces and mode (Layer 3 or Transparent Bridge).
  4. Configure a Decryption Policy rule (SSL Forward Proxy or SSL Inbound Inspection) to decrypt the desired traffic.
  5. Within the Decryption Policy rule, enable Decryption Broker and select the configured security chain to forward the decrypted traffic.
  6. Ensure Security Policies allow the traffic flow between the broker interface zones and the zones involved in the original session, as well as traffic returning from the chain.
  7. Commit the configuration.

Use Cases:

Decryption Broker vs. Decryption Mirror:

Decryption Support Summary

Decryption Concepts Quiz

1. If an administrator does not possess a website's certificate, which SSL decryption mode will allow the Palo Alto Networks NGFW to inspect traffic when users browse to HTTP(S) websites?

2. Which two benefits come from assigning a Decryption Profile to a Decryption policy rule with a “No Decrypt” action? (Choose two.)

3. If an administrator wants to decrypt SMTP traffic and possesses the server’s certificate, which SSL decryption mode will allow the Palo Alto Networks NGFW to inspect traffic to the server?

4. Which prerequisite must be satisfied before creating an SSH proxy Decryption policy?

5. What are three reasons for excluding a site from SSL decryption? (Choose three.)

6. When setting up a security profile, which three items can you use? (Choose three.)

7. What are three types of Decryption Policy rules? (Choose three.)

8. During SSL decryption, which three factors affect resource consumption? (Choose three.)

9. An engineer must configure a new SSL decryption deployment. Which profile or certificate is required before any traffic that matches an SSL decryption rule is decrypted?

10. What are two common reasons to use a "No Decrypt" action to exclude traffic from SSL decryption? (Choose two.)

11. In SSL Forward Proxy decryption, which two certificates can be used for certificate signing (impersonation)? (Choose two.)

13. As a best practice, which URL category should you target first for SSL decryption?

14. In a firewall, which three decryption methods are valid? (Choose three.)

15. What does SSL decryption require to establish a firewall as a trusted third party and to establish trust between a client and server to secure SSL/TLS connection?

16. Which type of interface does a firewall use to forward decrypted traffic to a security chain for inspection?

17. When planning to configure SSL Forward Proxy on a PA-5260, a user asks how SSL decryption can be implemented using a phased approach in alignment with Palo Alto Networks best practices. What should you recommend?

18. What are two valid deployment options for Decryption Broker? (Choose two.)

19. An engineer is tasked with enabling SSL decryption across the environment. What are three valid parameters of an SSL Decryption policy rule? (Choose three.)

20. SSL Forward Proxy decryption is configured, but the firewall uses Untrusted-CA to sign the website https://www.important-website.com certificate. End-users are receiving the "security certificate is not trusted" warning. Without SSL decryption, the web browser shows that the website certificate is trusted and signed by a well-known certificate chain: Well-Known-Intermediate and Well-Known-Root-CA. The network security administrator requires: 1. End-users must not get the warning for https://www.very-important-website.com/ 2. End-users should get the warning for any other untrusted website. Which approach meets the requirements?

21. The administrator for a small company has enabled decryption using a self-signed root certificate, creating Forward Trust and Forward Untrust certificates. The admin has not yet installed the root certificate onto client systems. What effect would this have?

22. During evaluation, several sites required for corporate users cannot be decrypted due to unsupported ciphers, and traffic to these sites will be blocked if decrypted. How should the engineer proceed?

23. A network security engineer wants to prevent resource-consumption issues on the firewall. Which strategy is consistent with decryption best practices to ensure consistent performance?

24. A network administrator wants to deploy SSL Inbound Inspection. What two attributes should the required server certificate have? (Choose two.)

25. A Firewall Engineer is migrating a legacy firewall to a Palo Alto Networks firewall to use features like App-ID and SSL decryption. Which order of steps is best to complete this migration?

26. A firewall administrator needs to inspect inbound HTTPS traffic on servers hosted in their DMZ. Which combination of features can allow PAN-OS to detect exploit traffic in a session with TLS encapsulation?

28. During the implementation of SSL Forward Proxy decryption, an administrator imports the company’s Enterprise Root CA and Intermediate CA certificates onto the firewall. The company’s Root and Intermediate CA certificates are also distributed to trusted devices. Which method should the administrator use when creating Forward Trust and Forward Untrust certificates on the firewall for use with decryption?

30. An engineer needs to configure SSL Forward Proxy to decrypt traffic on a PA-5260. The engineer uses a forward trust certificate from the enterprise PKI that expires December 31, 2025. The validity date on the PA-generated impersonation certificate is taken from what?

31. A network administrator wants to deploy SSL Forward Proxy decryption. What two attributes should a forward trust certificate have? (Choose two.)

32. When certificates are being imported to the firewall for SSL Inbound inspection and SSL Forward Proxy purposes, which three certificates require a private key? (Choose three.)

33. In an HA failover scenario what happens with sessions decrypted by a SSL Forward Proxy Decryption policy?

34. An engineer configures SSL decryption to get visibility into internal users’ traffic egressing the firewall. Which three types of interfaces support SSL Forward Proxy? (Choose three.)

35. An administrator has been tasked with deploying SSL Forward Proxy. Which two types of certificates are used to decrypt the traffic? (Choose two.)

36. Which two actions must an engineer take to configure SSL Forward Proxy decryption? (Choose two.)