In modern network security, a significant portion of traffic is encrypted using SSL/TLS. While encryption is vital for data privacy, it also creates blind spots for security appliances. Malicious actors increasingly use encrypted channels to conceal threats, exfiltrate data, or launch attacks. Palo Alto Networks Next-Generation Firewalls (NGFWs) provide robust decryption capabilities to regain visibility into this encrypted traffic, enabling comprehensive threat prevention and policy enforcement.
PAN-OS offers several methods for SSL/TLS decryption:
Once traffic is decrypted, the firewall can apply its full suite of security services, including App-ID, User-ID, Content-ID (Threat Prevention, WildFire, URL Filtering, DNS Security, Data Filtering). However, some organizations have existing security tools or specific compliance requirements that necessitate sending decrypted traffic to external systems for further analysis or logging. This is where Palo Alto Networks Decryption Mirroring and Decryption Broker functionalities become crucial.
Imagine encrypted traffic is like a sealed letter. Normally, security tools can only see the outside envelope (source, destination, etc.).
Decrypt Mirror Interfaces in Palo Alto Networks firewalls allow the forwarding of a copy of decrypted SSL/TLS traffic to a designated physical interface. This cleartext traffic can then be consumed by external, passive analysis tools such as Data Loss Prevention (DLP) systems, Intrusion Detection Systems (IDS), network forensics tools, or custom monitoring solutions. The key benefit is that these external tools do not need to perform SSL/TLS decryption themselves; the Palo Alto Networks firewall handles this complex task.
Decrypt Mirror
in PAN-OS (Network > Interfaces > Ethernet). This interface *cannot* have an IP address, be part of an Aggregate Ethernet (AE) group, VLAN, or Virtual Wire, nor can it be assigned to a Virtual Router or Zone. It essentially acts as a SPAN/RSPAN output port for decrypted traffic.
Decrypt Mirror
.
Decrypt
.
(See Detailed Configuration Steps below for specifics with screenshots from the technical guide).
Palo Alto Networks Decryption Broker extends the firewall's decryption capabilities by enabling it to decrypt SSL/TLS traffic and then forward the cleartext traffic through a series of *inline* third-party security appliances (a "security chain") before re-encrypting it and sending it to its original destination. This allows organizations to integrate specialized security tools (e.g., advanced sandboxes, niche DLP solutions, specific industry compliance checkers) that require inline access to cleartext traffic.
Unlike Decryption Mirroring, which sends a passive copy, Decryption Broker actively routes the live traffic flow through the external tools. This means the availability and performance of the security chain directly impact the traffic path.
Feature | Decryption Mirror | Decryption Broker |
---|---|---|
Purpose | Passive, out-of-band inspection of a copy of decrypted traffic. | Active, inline inspection of live decrypted traffic through a chain of external tools. |
Traffic Impact | No direct impact on original traffic flow (unless firewall resources are exhausted). | Directly impacts traffic flow. Chain failure/latency affects users. |
Interface Type Used | Dedicated "Decrypt Mirror" interface (no IP, L2/L3 config). | Standard Layer 2 or Layer 3 interfaces on the firewall to connect to the security chain. |
External Tool Action | External tools can only analyze; they cannot block or modify live traffic. | External tools can analyze, block, or potentially modify live traffic. |
Complexity | Relatively simpler to configure. | More complex due to security chain configuration, routing/bridging, and health monitoring. |
Use Cases | DLP (passive), forensics, threat hunting, compliance logging. | Integrating specialized inline security tools (e.g., third-party sandboxes, advanced WAFs, industry-specific inspection engines). |
License | "Decryption Port Mirror" license (free, requires activation and reboot). | Typically enabled by the "Decryption Port Mirror" license, but verify current Palo Alto Networks guides. |
Decrypt
).
Sequence of operations in Palo Alto Networks Decryption Mirroring, showing passive copying of decrypted traffic to an external tool.
Palo Alto Networks Decryption Mirroring configuration workflow.
Palo Alto Networks Decryption Broker traffic flow with an external security chain in Transparent Bridge mode. The PAN NGFW forwards decrypted traffic through inline Layer 2 tools.
Palo Alto Networks Decryption Broker traffic flow with an external security chain in Layer 3 mode. Decrypted traffic is routed to and from IP-addressable security tools.
Decision tree for selecting between Palo Alto Networks Decryption Mirror and Decryption Broker based on inspection requirements.
Follow these steps precisely in PAN-OS to configure Decryption Port Mirroring:
Superuser (role-based admin with necessary permissions) is required for this step.
If using a single virtual system (vsys) or for global setting:
If using multiple virtual systems (and want per-vsys control):
Decrypt Mirror
. (This option only appears after the "Decryption Port Mirror" license is installed and the firewall is rebooted).
Decrypt Mirror
in the previous step.
Decrypt
. This rule will define which traffic (based on source, destination, service, URL category, etc.) gets decrypted.
Decrypt
.
SSL/TLS decryption is one of the most resource-intensive operations a Palo Alto Networks NGFW performs, primarily impacting CPU utilization. Both Decryption Mirroring and Decryption Broker rely on this initial decryption.
show running resource-monitor
), session count (
show session info
), and decryption specific counters (
show counter global filter aspect-subsystem decryption delta yes
) on the PAN-OS CLI.
This option in the Decryption Profile (for Mirroring) or Security Chain forwarding settings (conceptually for Broker) determines what gets sent:
When using Decryption Mirroring or Broker in a Palo Alto Networks HA A/P (Active/Passive) or A/A (Active/Active) cluster:
show high-availability decryption-broker state
and
show high-availability decryption-broker flows
.
Verifying and troubleshooting Decryption Mirroring and Broker setups involves checking PAN-OS logs, statistics, and potentially performing packet captures.
decrypt
show counter global filter delta yes aspect-subsystem decryption # Displays various decryption counters, including successful decryptions, errors, and potentially mirrored/brokered packet counts (look for specific counters like 'mirr' or 'broker' if available in your PAN-OS version). show session all filter decryption-profile <your-profile-name> # Shows active sessions using your specific decryption profile. show session id <session-id> # Detailed view of a specific session. Look for flags indicating decryption status (e.g., 'decrypted: yes', 'ssl_proxy_ft_processed'). # For Decryption Broker: show system setting decryption-broker status # Shows the status of configured security chains, including health. show system setting decryption-broker statistics # Displays statistics for traffic forwarded through security chains. show high-availability decryption-broker state # In HA, shows the Decryption Broker state on each peer. debug dataplane pool statistics | match Decryption # Shows memory pool usage for decryption, useful for resource exhaustion troubleshooting. # Packet Captures (use with caution in production): debug dataplane packet-diag set filter on match ... debug dataplane packet-diag set capture stage receive file rx.pcap debug dataplane packet-diag set capture stage transmit file tx.pcap debug dataplane packet-diag set capture stage drop file dp.pcap # Configure filters carefully to capture relevant traffic (e.g., on mirror interface, or pre/post security chain). # Then: view-pcap follow yes debug-pcap <stage>.pcap