Palo Alto Networks Decryption: Unveiling Hidden Threats

In today's sophisticated threat landscape, encryption is ubiquitously used to protect data in transit. While beneficial for privacy, encryption also provides a veil for cybercriminals to hide malware, command-and-control (C2) communications, and data exfiltration. Palo Alto Networks Next-Generation Firewalls (NGFWs) provide robust decryption capabilities, allowing organizations to regain visibility into encrypted traffic and apply the full suite of security services, including App-ID, Threat Prevention (IPS, Antivirus, Anti-Spyware), URL Filtering, WildFire, and Data Loss Prevention (DLP).

CRITICAL (Palo Alto Networks): Decryption is essential for effective threat prevention. Without it, a significant portion of network traffic remains uninspected, rendering many security services ineffective against threats hidden within SSL/TLS or SSH sessions.

Why Decrypt Traffic with Palo Alto Networks?

Palo Alto Networks Decryption Modes:

Palo Alto Networks firewalls support several decryption modes to address different use cases:

  1. SSL Forward Proxy: Decrypts outbound SSL/TLS traffic initiated by internal clients to external web servers.
  2. SSL Inbound Inspection: Decrypts inbound SSL/TLS traffic destined for internal servers (e.g., web servers, application servers) hosted within the organization's network.
  3. SSH Proxy: Decrypts and inspects SSH (Secure Shell) traffic, primarily to control and monitor SSH sessions and prevent unauthorized port forwarding (tunneling).
  4. SSL Decryption Mirror (Passive Decryption): While not an active inspection mode, this feature allows the firewall to forward a copy of decrypted traffic to a third-party appliance (e.g., an external DLP or threat analytics system) for out-of-band inspection. This requires that the firewall has access to the session keys, typically through SSL Inbound Inspection or by importing session keys from servers (if supported by the server infrastructure).
PCNSE/PCNSA Exam Note (Palo Alto Networks): Understanding the fundamental differences between SSL Forward Proxy and SSL Inbound Inspection, including their respective use cases and certificate requirements, is critical for the PCNSE exam. Be prepared for scenario-based questions asking which decryption method is appropriate.

General Decryption Process on PAN-OS:

Regardless of the specific mode, the decryption process on a Palo Alto Networks firewall generally involves these stages within the Single-Pass Parallel Processing (SP3) architecture:

  1. Policy Match: Traffic must first match a Decryption Policy rule that specifies the action to decrypt.
  2. Session Setup & Certificate Handling:
    • SSL Forward Proxy: The firewall intercepts the client's TLS handshake, impersonates the destination server to the client (using a forged certificate signed by a Forward Trust CA), and establishes a separate TLS session with the actual external server.
    • SSL Inbound Inspection: The firewall uses the imported private key and certificate of the internal server to decrypt the client's incoming TLS session, inspects the traffic, and then re-encrypts it (or establishes a new TLS session) to the internal server.
    • SSH Proxy: The firewall acts as a man-in-the-middle for the SSH connection.
  3. Decryption & Inspection: The decrypted cleartext payload is then passed to other security engines like App-ID, Content-ID (Threat Prevention, URL Filtering, WildFire), and DLP for full inspection.
  4. Re-encryption & Forwarding: After inspection, the traffic is re-encrypted and forwarded to its destination.
High-level overview of the decryption and inspection flow within a Palo Alto Networks firewall. Traffic matching a decryption policy undergoes decryption, full security inspection, and then re-encryption.

High-level overview of the decryption and inspection flow within a Palo Alto Networks firewall. Traffic matching a decryption policy undergoes decryption, full security inspection, and then re-encryption.

This overview sets the stage for a deeper exploration of each specific decryption method, their configurations, and best practices within the Palo Alto Networks ecosystem.

SSL Forward Proxy (Outbound SSL/TLS Decryption)

Use Case: SSL Forward Proxy is used to decrypt and inspect SSL/TLS traffic initiated by internal users (clients) connecting to external websites and services (servers). This is crucial for preventing malware downloads, blocking access to malicious or inappropriate websites, identifying command-and-control (C2) traffic, and preventing data exfiltration over encrypted channels.

How SSL Forward Proxy Works in PAN-OS:

The Palo Alto Networks firewall acts as a "man-in-the-middle" (MITM) for outbound SSL/TLS connections. The process involves:

  1. Client Initiates Connection: An internal client attempts to establish an SSL/TLS session with an external server (e.g., https://www.example.com).
  2. Firewall Interception: The firewall, based on a matching Decryption Policy rule, intercepts the client's TLS Client Hello message.
  3. Firewall-Server Session: The firewall forwards the Client Hello (or a modified version) to the actual external server and establishes a legitimate SSL/TLS session with it. The server responds with its server certificate.
  4. Certificate Forgery: The firewall receives the external server's certificate. It then dynamically generates (forges) a new certificate that appears to be for the requested external server (e.g., www.example.com). This forged certificate is signed by a Certificate Authority (CA) that the firewall itself controls. This CA is known as the Forward Trust Certificate .
  5. Client Trust: For the client to trust this forged certificate without warnings, the client's browser/system must trust the firewall's Forward Trust CA certificate. This typically involves deploying the Forward Trust CA certificate to all internal client devices via Group Policy (GPO), MDM, or manual installation.
  6. Firewall-Client Session: The firewall presents this forged certificate to the internal client. If the client trusts the Forward Trust CA, it establishes an SSL/TLS session with the firewall.
  7. Decryption and Inspection: Now, the firewall has two separate SSL/TLS sessions: one with the client and one with the server. It decrypts traffic from the client, inspects it using App-ID, Content-ID (Threat Prevention, URL Filtering, WildFire, DLP), and then re-encrypts it before sending it to the external server. The same process occurs for traffic from the server to the client.
Detailed sequence of SSL Forward Proxy. The firewall forges a server certificate signed by its Forward Trust CA, enabling it to decrypt and inspect the traffic between the internal client and the external server.

Detailed sequence of SSL Forward Proxy. The firewall forges a server certificate signed by its Forward Trust CA, enabling it to decrypt and inspect the traffic between the internal client and the external server.

Key Configuration Components in PAN-OS:

! Example: Basic Decryption Policy Rule for SSL Forward Proxy
! In PAN-OS GUI: Policies > Decryption > Add

Name: Decrypt-Outbound-Web
Source Zones: [trust-zone]
Source Addresses: [internal-networks]
Source Users: [any]
Destination Zones: [untrust-zone]
Destination Addresses: [any]
Service/URL Category: [any] ! Best practice: Be more specific, e.g., URL categories known to be risky or needing inspection
Action: Decrypt
Decryption Profile: [your-ssl-forward-proxy-profile]
Type: ssl-forward-proxy
        

Considerations and Limitations:

PCNSE/PCNSA Exam Note (Palo Alto Networks): Be able to identify the role of the Forward Trust and Forward Untrust certificates. Understand that the Forward Trust certificate (or its issuer) MUST be deployed to client endpoints for seamless decryption. Questions often revolve around troubleshooting client certificate errors (due to untrusted Forward Trust CA) or why certain applications break (certificate pinning).
Gotcha! (Palo Alto Networks): A common misconfiguration is failing to deploy the Forward Trust CA certificate to client browsers/systems. This results in users receiving frequent certificate warnings for every SSL site they visit that is being decrypted, leading to user complaints and potentially security risks if users are trained to ignore such warnings.

SSL Inbound Inspection (Inbound SSL/TLS Decryption)

Use Case: SSL Inbound Inspection is used to decrypt and inspect SSL/TLS traffic destined for internal servers (e.g., corporate web servers, application servers, email servers) that are protected by the Palo Alto Networks firewall. This allows the firewall to identify and block threats targeting these servers before they reach the application, ensuring that encrypted traffic does not bypass security measures.

How SSL Inbound Inspection Works in PAN-OS:

For SSL Inbound Inspection, the firewall needs access to the server's private key and certificate. The process is as follows:

  1. Import Server Certificate and Private Key: The administrator imports the SSL certificate (and its corresponding private key) of the internal server that needs protection onto the Palo Alto Networks firewall. This is done under Device > Certificate Management > Certificates.
  2. Client Initiates Connection: An external client initiates an SSL/TLS session to an internal server (e.g., https://yourcompany.com). The traffic is typically routed to the firewall's external interface, often via a Destination NAT (DNAT) rule if the server is in a private IP space.
  3. Firewall Interception and Decryption: The firewall, based on a matching Decryption Policy rule (type: ssl-inbound-inspection), intercepts the incoming TLS connection. Using the imported server certificate and its private key, the firewall decrypts the client's traffic.
  4. Inspection: The decrypted cleartext traffic is passed through the firewall's security engines (App-ID, Content-ID: Threat Prevention, URL Filtering if applicable, WildFire, DLP).
  5. Re-encryption and Forwarding to Server: After inspection, the firewall re-encrypts the traffic (or establishes a new TLS session if necessary, though often it passes the decrypted traffic to the server if the server is in a secure segment and configured to accept HTTP) and forwards it to the actual internal server. If re-encrypting, it typically uses the server's original certificate.

PAN-OS also supports Session Key Forwarding for SSL Inbound Inspection in specific scenarios (e.g., with certain load balancers or server configurations that can export session keys). However, the most common method involves importing the server's private key.

Detailed sequence of SSL Inbound Inspection. The firewall uses the imported server private key to decrypt, inspect, and then re-encrypt traffic destined for an internal server.

Detailed sequence of SSL Inbound Inspection. The firewall uses the imported server private key to decrypt, inspect, and then re-encrypt traffic destined for an internal server.

Key Configuration Components in PAN-OS:

Considerations and Limitations:

PCNSE/PCNSA Exam Note (Palo Alto Networks): For SSL Inbound Inspection, you MUST know that the server's private key is required on the firewall. Be able to differentiate this from SSL Forward Proxy, which uses a firewall-generated Forward Trust CA. Understand that Decryption Policies for Inbound Inspection must specify the server certificate.

Certificates & PKI in PAN-OS for Decryption

Proper certificate management is the cornerstone of successful SSL/TLS decryption with Palo Alto Networks firewalls. PAN-OS provides comprehensive tools for managing certificates, Certificate Authorities (CAs), and related Public Key Infrastructure (PKI) components.

Navigate to Device > Certificate Management in the PAN-OS GUI to manage these elements.

Key Certificate Types and Their Roles in Decryption:

PCNSE/PCNSA Exam Note (Palo Alto Networks): Understand the distinction between Forward Trust (for signing forged certs in outbound decryption) and Server Certificates (actual server certs/keys for inbound decryption). Knowing where to configure/upload these in PAN-OS (Device > Certificate Management > Certificates) is key.

Certificate Revocation Checking:

PAN-OS can check the revocation status of certificates it encounters to ensure they haven't been compromised or revoked by the issuing CA. This is configured in Certificate Profiles (Device > Certificate Management > Certificate Profile).

Configuring OCSP/CRL checking is a best practice for both SSL Forward Proxy (validating external server certs) and SSL Inbound Inspection (validating client certs if client authentication is used).

Gotcha! (Palo Alto Networks): If the firewall cannot reach OCSP responders or CRL distribution points (e.g., due to routing or DNS issues), certificate validation might fail. This can lead to legitimate sites being blocked if the Certificate Profile is configured to block sessions with unknown revocation status. Ensure proper network connectivity for these services.

Generating a Self-Signed CA for Forward Trust on PAN-OS:

  1. Navigate to Device > Certificate Management > Certificates .
  2. Click Generate .
  3. Certificate Name: e.g., "Forward-Trust-CA".
  4. Common Name (CN): A descriptive name, e.g., "MyCompany Internal Forward Trust CA".
  5. Select Certificate Authority (CA) checkbox.
  6. Configure other parameters like key size, digest, expiry.
  7. Click Generate .
  8. Once generated, select this certificate in your SSL Forward Proxy Decryption Profile.
  9. Export this CA certificate ( without the private key ) and deploy it to all client trust stores.

Importing a Server Certificate for SSL Inbound Inspection:

  1. Navigate to Device > Certificate Management > Certificates .
  2. Click Import .
  3. Certificate Name: e.g., "WebServer-Cert".
  4. Certificate File: Browse to your server's certificate file (e.g., .pem, .pfx, .p12).
    • If using .pfx or .p12, it includes the private key and you'll be prompted for its password.
    • If using .pem, you'll import the certificate file and then separately import the private key file.
  5. If importing key separately: Private Key File: Browse to the private key file. Enter passphrase if encrypted.
  6. Click OK .
  7. Select this imported certificate in your SSL Inbound Inspection Decryption Policy rule.
diagram_4_May_19_2025_06-24PM

PAN-OS Decryption Policies and Profiles

Decryption Policies and Decryption Profiles are the core components used to control how and what traffic the Palo Alto Networks firewall decrypts. They provide granular control over the decryption process.

Decryption Policies

Decryption Policies define *which* traffic should be subjected to decryption. They are configured under Policies > Decryption and are evaluated similarly to Security Policy rules: top-down, first match.

A Decryption Policy rule consists of:

PCNSE/PCNSA Exam Note (Palo Alto Networks): Understand the evaluation order of Decryption Policies (top-down, first match). Be clear on when to use 'No Decrypt' (for exclusions) versus 'Decrypt'. For 'Decrypt' actions, you must specify the type (ssl-forward-proxy, ssl-inbound-inspection, ssh-proxy) and a Decryption Profile. For 'ssl-inbound-inspection', you must also select the server certificate.

Example Decryption Policy Strategy:

  1. Rule 1 (High Priority Exclusions): URL Categories like Financial Services, Health and Medicine. Action: No Decrypt. Reason: Privacy, compliance, or sites known to break with decryption.
  2. Rule 2 (Known Problematic Sites/Apps): Specific FQDNs or App-IDs that use certificate pinning or have other issues. Action: No Decrypt. Reason: Ensure application functionality.
  3. Rule 3 (Broad Decryption): Decrypt general web categories (e.g., social-networking, streaming-media, high-risk categories). Action: Decrypt (Type: ssl-forward-proxy). Reason: Maximize visibility and threat prevention.
  4. Rule 4 (Inbound Server Protection): Decrypt traffic to specific internal servers. Action: Decrypt (Type: ssl-inbound-inspection, specify Server Certificate). Reason: Protect internal assets.
  5. Rule 5 (Default - Implicit): PAN-OS has an implicit final rule of "No Decrypt" if no explicit rule is matched. It is best practice to have an explicit "No Decrypt Any" rule at the bottom if your policy is to decrypt only specific traffic.

Decryption Profiles

Decryption Profiles define *how* the matched traffic should be decrypted. They are configured under Objects > Decryption > Decryption Profile and are referenced by Decryption Policy rules.

Key settings within a Decryption Profile (can vary slightly based on PAN-OS version):

It's common to have multiple Decryption Profiles tailored for different scenarios (e.g., a lenient profile for some sites, a strict one for general browsing, a specific one for inbound servers).

diagram_5_May_19_2025_06-24PM

SSH Proxy (SSH Decryption and Control)

Use Case: SSH Proxy on Palo Alto Networks firewalls allows for the decryption and inspection of Secure Shell (SSH) traffic. The primary goals are to control and monitor SSH sessions, prevent unauthorized activities like SSH tunneling (port forwarding), and potentially inspect for malicious commands or file transfers within interactive SSH sessions if further content inspection capabilities are applied.

How SSH Proxy Works in PAN-OS:

Similar to SSL Forward Proxy, the firewall acts as a "man-in-the-middle" for SSH connections:

  1. Client Initiates SSH Connection: A user or process initiates an SSH connection to an SSH server.
  2. Firewall Interception: Based on a matching Decryption Policy rule (type: ssh-proxy), the firewall intercepts the SSH connection.
  3. Firewall-Server Session: The firewall establishes its own SSH session with the destination SSH server. It receives the server's host key.
  4. Firewall-Client Session & Host Key Handling: The firewall establishes an SSH session with the client.
    • By default, the firewall presents its own unique SSH host key to the client. This key is generated by the firewall (typically one per firewall or per VSYS). If this key changes (e.g., after a firewall reboot, if the key is not persistent, or if a different firewall in an HA pair handles a re-established session), clients will receive a "host key changed" warning, which can be disruptive.
    • Alternatively, for specific servers, you can import the actual server's host key onto the firewall and configure the SSH Proxy to present that specific key to the client when proxying to that server. This avoids the client-side host key warning but requires managing these keys on the firewall.
  5. Decryption and Inspection: The firewall now sits in the middle of two SSH connections. It decrypts traffic from the client, inspects it, and re-encrypts it for the server, and vice-versa. Inspection focuses on:
    • SSH Channel Control: PAN-OS can identify and control different types of SSH channels, such as:
      • ssh-pty (interactive shell)
      • ssh-exec (remote command execution)
      • scp (secure copy)
      • sftp (SSH file transfer protocol)
      • ssh-tunnel (port forwarding - X11, local, remote)
    • Security Policy Enforcement: Based on the identified SSH sub-application (e.g., ssh-tunnel ), Security Policies can be applied to allow or deny specific SSH functionalities. For example, allow ssh-pty but deny ssh-tunnel .
Sequence of SSH Proxy operation. The firewall intercepts the SSH connection, manages host keys, and inspects decrypted channel data, allowing for granular control over SSH functionalities like tunneling.

Sequence of SSH Proxy operation. The firewall intercepts the SSH connection, manages host keys, and inspects decrypted channel data, allowing for granular control over SSH functionalities like tunneling.

Key Configuration Components in PAN-OS:

Limitations and Considerations:

PCNSE/PCNSA Exam Note (Palo Alto Networks): Key takeaways for SSH Proxy: its main purpose is to control SSH sub-applications (especially blocking `ssh-tunnel`), it primarily works with password authentication, and it can cause host key warnings for clients. You need BOTH a Decryption Policy (type ssh-proxy) AND Security Policies (to act on App-IDs like `ssh-tunnel`).
Gotcha! (Palo Alto Networks): Simply creating an SSH Proxy Decryption Policy rule is not enough to block SSH tunneling. You MUST also have a Security Policy rule that explicitly denies the `ssh-tunnel` application for the traffic that is being decrypted. Without this, the tunnel might be identified but still allowed by a broader "allow ssh" Security Policy rule.

Decryption Exclusions & Troubleshooting in PAN-OS

While decrypting traffic is crucial for security, there are scenarios where decryption is not possible, not desirable, or causes issues. Palo Alto Networks firewalls provide mechanisms to exclude specific traffic from decryption and robust tools for troubleshooting decryption problems.

Reasons for Decryption Exclusions:

Configuring Decryption Exclusions:

Exclusions are typically configured using Decryption Policy rules with an action of "No Decrypt" . These rules should be placed higher in the policy list than broader decryption rules.

Common criteria for "No Decrypt" rules:

PAN-OS also offers a "SSL Decryption Exclusion" list (Device > Setup > Content-ID > SSL Decryption Exclusion on older versions, or managed via Application Override/custom App-ID on newer versions for some scenarios) for specific server certificates that should not be decrypted (e.g., if they are known to be pinned). However, using "No Decrypt" Decryption Policy rules based on FQDN or URL category is generally more flexible and common.

PCNSE/PCNSA Exam Note (Palo Alto Networks): Know that "No Decrypt" rules in the Decryption Policy are the primary way to implement exclusions. Understand common reasons for exclusions, especially certificate pinning and privacy concerns for categories like financial services.

Troubleshooting Decryption Issues:

When decryption is enabled, issues can manifest as broken websites, application failures, or certificate errors on client machines.

1. Client-Side Checks:

2. Firewall Logs:

3. Firewall CLI Commands:

Useful for real-time troubleshooting and diagnostics:

4. Packet Captures (PCAPs):

Gotcha! (Palo Alto Networks): When troubleshooting, always verify that the correct Decryption Policy rule is being matched and that the associated Decryption Profile has the intended settings. A common issue is a "No Decrypt" rule placed too low, or a too-restrictive setting in the Decryption Profile (e.g., blocking all untrusted issuers without realizing an internal site uses a private CA not yet trusted by the firewall). Also, ensure DNS is resolving correctly for OCSP/CRL checks and for FQDN objects used in policies.
diagram_7_May_19_2025_06-24PM

PAN-OS Decryption Performance & Sizing

Enabling SSL/TLS and SSH decryption on Palo Alto Networks firewalls significantly enhances security visibility but also imposes additional processing load. Proper sizing of the firewall and understanding performance implications are critical for a successful decryption deployment.

Factors Affecting Decryption Performance:

PCNSE/PCNSA Exam Note (Palo Alto Networks): Be aware that decryption is resource-intensive, particularly impacting CPU. Understand that enabling decryption will reduce the overall maximum throughput and CPS of a firewall compared to its datasheet values for non-decrypted traffic. Datasheets often provide "SSL Decryption Throughput" or "Threat Prevention with SSL Decryption" metrics.

Sizing Considerations:

  1. Baseline Current Traffic: Understand your current network traffic profile: total throughput, connections per second, percentage of SSL/TLS traffic. Use firewall reports, NetFlow, or other monitoring tools.
  2. Estimate Decryption Scope: Determine how much of the SSL/TLS traffic you plan to decrypt. A phased approach, starting with high-risk categories or specific user groups, is often recommended.
  3. Consult Palo Alto Networks Datasheets: Review the datasheet for your target firewall model(s). Look for metrics like:
    • SSL Decryption Throughput (or similar, e.g., "Threat Prevention Throughput (HTTP/SSL traffic with Decryption)")
    • SSL Decryption Connections Per Second
    • SSL Decryption Concurrent Sessions
    These numbers are typically lower than the raw firewall throughput.
  4. Apply a Derating Factor: Datasheet numbers are often based on ideal conditions. In real-world deployments with multiple security services enabled, the actual performance may be lower. It's common practice to derate datasheet values (e.g., by 20-50%) depending on complexity and risk tolerance.
  5. Consider Future Growth: Plan for future increases in traffic volume, encrypted traffic percentage, and user count.
  6. Use Palo Alto Networks Sizing Tools/Consultants: For complex environments or critical deployments, leverage Palo Alto Networks sizing tools (if available to partners/customers) or consult with Palo Alto Networks sales engineers or professional services. They can help model performance based on your specific requirements.
  7. Hardware Refresh Cycles: If existing hardware is old, enabling widespread decryption might necessitate a hardware upgrade to a newer model with better decryption capabilities.
  8. High Availability (HA): In an Active/Passive HA pair, the active firewall handles all decryption. Ensure it's sized adequately. Active/Active HA can distribute load, but has its own complexities, especially with session state for decrypted traffic.
CRITICAL (Palo Alto Networks): Under-sizing a firewall for decryption can lead to severe performance degradation, high CPU utilization, dropped packets, and a poor user experience. It's better to over-provision slightly than to under-provision.

Monitoring Decryption Performance:

After deploying decryption, continuously monitor its impact:

Optimizing Decryption Performance:

Gotcha! (Palo Alto Networks): A common pitfall is enabling broad decryption policies (e.g., "decrypt any-any") without fully understanding the traffic mix or the firewall's capacity. This can quickly overwhelm the firewall. A phased rollout, starting with limited decryption and monitoring impact, is highly recommended.

HSM Integration for Enhanced Private Key Security in PAN-OS

For organizations with stringent security requirements for managing cryptographic keys, Palo Alto Networks firewalls support integration with Hardware Security Modules (HSMs). An HSM is a dedicated hardware device designed to securely generate, store, and manage digital keys, protecting them from unauthorized access, theft, or misuse.

Why Use HSMs with Palo Alto Networks Decryption?

The primary use case for HSM integration in the context of decryption is to protect the private keys used by the firewall:

Benefits of HSM Integration:

Supported HSM Vendors and Models:

Palo Alto Networks typically partners with leading HSM vendors. Common examples include:

The specific list of supported HSM models and required firmware versions can change. Always consult the official Palo Alto Networks documentation (Compatibility Matrix, Administrator's Guides) for the most up-to-date information for your PAN-OS version.

PCNSE/PCNSA Exam Note (Palo Alto Networks): For the PCNSE, you should be aware that PAN-OS supports HSM integration for protecting private keys used in decryption (especially Forward Trust CA key and Inbound Inspection server keys). Know the general benefits (enhanced security, compliance). You are not typically expected to know detailed HSM configuration steps, but understanding the *why* and *what* is important.

HSM Configuration Overview in PAN-OS:

The exact configuration steps vary depending on the HSM vendor and PAN-OS version, but generally involve:

  1. HSM Setup:
    • Initialize and configure the HSM appliance itself (network settings, partitions/slots, user roles, client registration).
    • Install necessary client software or drivers on the Palo Alto Networks firewall if required by the HSM vendor (often done via a PAN-OS HSM client package).
  2. Firewall HSM Configuration (Device > HSM):
    • Add an HSM configuration profile on the firewall.
    • Provide details such as HSM IP address(es), port, partition label/password, and client certificate/key for authentication to the HSM (if applicable).
    • Establish a secure connection between the firewall and the HSM.
  3. Generating/Importing Keys on HSM:
    • For Forward Trust CA: You can generate the CA key pair directly on the HSM via the firewall interface, or import an existing CA key pair into the HSM (if supported by the HSM and PAN-OS). The private key remains on the HSM.
    • For SSL Inbound Inspection Server Keys: Generate server key pairs on the HSM, or import existing server private keys into the HSM.
  4. Associating Certificates with HSM-Stored Keys:
    • When generating a certificate on the firewall (e.g., for Forward Trust CA) or importing a certificate (e.g., for an Inbound Inspection server cert whose key is on HSM), you specify that the private key resides on the configured HSM.
    • PAN-OS will then instruct the HSM to perform cryptographic operations (like signing or decryption) using the key stored within the HSM, rather than using a key stored on the firewall's local filesystem.
  5. Decryption Profile Configuration:
    • In the Decryption Profile (Objects > Decryption > Decryption Profile), you may need to explicitly enable HSM usage or select keys that are HSM-protected. For example, there might be options like "Use HSM for Forward Trust private key operations."
    • Specify actions if HSM is not available (e.g., "Block sessions if HSM not available").
High-level interaction between a Palo Alto Networks firewall and an HSM. Private keys are stored on the HSM, and the firewall requests cryptographic operations from the HSM, enhancing key security.

High-level interaction between a Palo Alto Networks firewall and an HSM. Private keys are stored on the HSM, and the firewall requests cryptographic operations from the HSM, enhancing key security.

Considerations for HSM Integration:

  • Performance: Performing cryptographic operations on an external HSM introduces network latency compared to using locally stored keys. The performance impact depends on the HSM model, network speed between firewall and HSM, and the volume of operations. High-performance HSMs are designed to minimize this. Test thoroughly.
  • Complexity: HSM integration adds complexity to the setup and management of the decryption infrastructure.
  • Cost: HSMs are specialized hardware and represent an additional investment.
  • High Availability (HA) for HSMs: Ensure your HSM deployment is also highly available (e.g., clustered HSMs) to prevent it from becoming a single point of failure for decryption services. The firewall should be configured to connect to multiple HSMs in an HA group if available.
  • Backup and Recovery: Securely back up HSM key material according to vendor best practices.
  • PAN-OS Version Compatibility: Always verify HSM vendor, model, and firmware compatibility with your specific PAN-OS version.
Gotcha! (Palo Alto Networks): Misconfiguring the HSM settings on the firewall, network connectivity issues between the firewall and HSM, or HSM partition/client authentication problems can lead to decryption failures. If the Decryption Profile is set to "Block sessions if HSM not available," an HSM issue can halt all traffic requiring HSM-based decryption. Careful planning and testing are essential.

PCNSE Knowledge Check: Palo Alto Networks Decryption

1. Which certificate is essential for internal clients to trust the server certificates forged by a Palo Alto Networks firewall during SSL Forward Proxy decryption?

2. What is the primary requirement on the Palo Alto Networks firewall to perform SSL Inbound Inspection for an internal web server?

3. An internal user reports receiving certificate errors for all HTTPS websites after SSL Forward Proxy was enabled. What is the most likely cause?

4. Which Palo Alto Networks feature is primarily used to prevent unauthorized SSH port forwarding (tunneling) when SSH Proxy is enabled?

5. When configuring a Decryption Policy rule for SSL Inbound Inspection in PAN-OS, what specific item, in addition to source/destination and service, must be specified in the rule?

6. A website uses certificate pinning. What is the expected behavior when a Palo Alto Networks firewall attempts SSL Forward Proxy decryption for this site?

15. What information is primarily found in the Palo Alto Networks Decryption logs (Monitor > Logs > Decryption)?

16. Which of the following is a limitation of Palo Alto Networks SSH Proxy regarding authentication methods?

17. What is the firewall's action if it encounters an SSL/TLS session using a cipher suite it does not support for decryption, and the Decryption Profile is set to "no-decrypt" for unsupported ciphers?

18. In an Active/Passive HA pair, what typically happens to existing SSL Forward Proxy decrypted sessions if a failover occurs?

19. Which PAN-OS feature is primarily responsible for identifying the specific application within an SSH session (e.g., ssh-pty, ssh-tunnel) after SSH Proxy has decrypted it?

20. When configuring SSL Inbound Inspection for a server that uses an Elliptic Curve Cryptography (ECC) certificate, what must be ensured on the Palo Alto Networks firewall?