Decryption Logging & Monitoring

Log Overview

Effective decryption requires robust monitoring and logging to ensure it's working as expected, identify issues, and understand the security posture regarding encrypted traffic. Palo Alto Networks firewalls provide specific Decryption logs alongside other monitoring tools like the Application Command Center (ACC) for this purpose.

Key purposes and benefits of using Decryption logs include:

By default, the firewall logs only unsuccessful TLS handshakes. Logging successful handshakes provides much greater visibility but significantly increases log volume and requires careful consideration of log storage capacity.

Decryption logs are NOT generated for:

Decryption Logging & Monitoring

Log Details & Fields

Decryption logs capture numerous parameters about the session and the TLS/SSL handshake process. Key fields often include:

Unsupported Parameters

Not all log fields are populated for every type of decryption or TLS version due to protocol differences or where the information is available. For example:

Example Decryption Log View (Illustrative):

Decryption Log Example showing various fields like SNI, TLS Version, Error

Decryption Logging & Monitoring

Log Configuration

Configuring decryption logging involves several steps:

  1. Enable Logging in Decryption Policy Rules:
    • Navigate to Policies > Decryption .
    • Edit the specific rule(s) for which you want logs.
    • Go to the Actions tab (or Options tab in older versions).
    • Under Log Settings , you can choose to Log successful TLS handshakes in addition to the default logging of unsuccessful handshakes.
    • Logging successful handshakes significantly increases log volume.
    • To log traffic that is intentionally *not* decrypted (for visibility), use a "No Decrypt" action rule and ensure logging is enabled.
    • Decryption Policy Rule logging options - Log unsuccessful session default, option to log successful
  2. Configure Log Forwarding (Optional but Recommended):
    • If sending logs to an external system (Syslog server, SIEM, Cortex Data Lake, Panorama), create a Log Forwarding Profile.
    • Navigate to Objects > Log Forwarding and create a new profile.
    • Add a profile match list entry, select the Decryption log type, and configure the destination (e.g., Syslog server profile, Panorama/CDL).
    • You can add filters here to only forward specific types of decryption logs (e.g., only errors).
    • Apply this Log Forwarding Profile to your Decryption policy rules under the Actions/Options tab.
    • Ensure secure transport and storage for forwarded logs due to potentially sensitive content.
    • Specific formats like CEF or LEEF can be configured if required by the receiving system.
    • Log Forwarding Profile configuration showing Decryption log type selected
  3. Adjust Log Storage Quotas:
    • If logging successful handshakes or a high volume of failures, you may need to increase the storage allocated to Decryption logs on the firewall or Panorama.
    • Navigate to Device > Setup > Management and edit Logging and Reporting Settings .
    • Under the Log Storage tab, adjust the Quota (%) for the Decryption log type.
    • The default quota is typically very small (e.g., 1%). Increase this by reducing quotas for other less critical log types, ensuring the total does not exceed 100%.
    • Consider factors like traffic volume, decryption rate, and retention needs when sizing quotas.
    • Logging and Reporting Settings - Log Storage Quotas showing default Decryption Log quota
  4. Set Log Expiration Periods:
    • Also under Log Storage settings, you can set the Max Days for how long decryption logs are kept before being automatically purged.
    • If the storage quota is reached before the expiration period, older logs will be purged regardless.

Decryption Logging & Monitoring

App-ID in Decryption Logs

The Decryption log attempts to populate the Application field using App-ID information learned from the corresponding Traffic log entry for the same session.

Decryption Logging & Monitoring

Troubleshooting with Logs

Decryption logs are a primary tool for diagnosing decryption problems.

Decryption Logging & Monitoring

ACC Widgets (PAN-OS 11.1+)

The Application Command Center (ACC), particularly the SSL Activity tab (introduced in PAN-OS 11.1), provides a high-level graphical overview of decryption trends and potential issues, complementing the detailed Decryption logs.

Key Widgets include:

Example: Drilling down in ACC

ACC Widget showing TLS Version activity

ACC Widget showing initial TLS Version distribution.

ACC Widget drilled down to show SNIs using TLSv1.2

After clicking TLSv1.2, the widget shows SNIs using that version.

The ACC widgets allow interactive filtering and drill-down. Clicking on chart elements often refines the view, and a "Jump to Logs" icon typically allows pivoting directly to the filtered Decryption log view for detailed session analysis corresponding to the widget data.

Jump to logs icon in ACC widget

Note: ACC widgets rely on identified applications (App-ID). If App-ID is incomplete or unknown in the logs (due to reasons mentioned previously), that traffic might not be accurately represented in application-specific widget views.

Knowledge Check: Decryption Logging & Monitoring

Test your understanding of the concepts.

1. Which log type specifically records details about the decryption handshake process itself and handshake errors?

Explanation: The Decryption log is specifically designed to capture details of the SSL/TLS handshake process, including versions, ciphers, certificate info, and errors encountered during decryption setup. The Traffic log shows the final state (decrypted: yes/no) but not the handshake details. Relevance: Log Types

2. Which monitoring tool provides a high-level graphical overview of decryption failure reasons and traffic using weak TLS versions (especially in PAN-OS 11.1+)?

Explanation: The Application Command Center (ACC), particularly the SSL Activity tab introduced in PAN-OS 11.1, provides widgets specifically designed to visualize decryption statistics, including failure reasons and protocol/cipher usage trends. Relevance: Monitoring Tools

3. To confirm if a specific, completed session was ultimately processed in a decrypted state by the firewall policies, which log should you primarily check?

Explanation: The Traffic log includes flags or fields (like 'Decrypted') that indicate the final decryption status of a completed session after all policy processing. The Decryption log focuses on the setup/handshake phase. Relevance: Log Types, Verification

4. Which is not a typical reason for a 'decrypt-cert-validation' error in the Decryption logs?

Explanation: Certificate validation errors relate to trusting the certificate itself (issuer trust, expiration, revocation status, client auth). An unsupported cipher suite is a protocol-level mismatch, typically logged with a different error index/message related to cipher negotiation. Relevance: Troubleshooting, Error Types

5. By default, what type of decryption events are logged by the Palo Alto Networks firewall?

Explanation: The default configuration for Decryption Policy rules is to log only the sessions where the TLS handshake fails. Logging successful handshakes must be explicitly enabled in the rule's action/options. Relevance: Logging Configuration Defaults

6. If the App-ID in a Decryption log entry shows as 'incomplete', what is a likely reason?

Explanation: The Decryption log relies on the Traffic log to populate the App-ID field. If the Security Policy rule allowing the traffic does not have Traffic logging enabled, the App-ID cannot be determined for the Decryption log entry. Timing issues or handshake failures can also cause this. Relevance: App-ID in Logs, Dependencies

7. Why might you need to increase the Log Storage Quota for Decryption logs?

Explanation: Logging successful handshakes generates significantly more log entries than only logging failures (the default). This increased volume often necessitates allocating a larger percentage of the firewall's log storage capacity to Decryption logs. Relevance: Log Configuration, Storage

8. Which CLI command displays sessions currently being decrypted (matching the 'ssl-decrypt' filter)?

Explanation: The command `show session all filter ssl-decrypt yes` filters the session table to show only sessions that have the 'ssl-decrypt' flag set, indicating successful decryption. While `count yes` exists, the question asks to check the sessions themselves, not just the count. `debug` commands are for more in-depth troubleshooting. [8 (implies filtering), common CLI knowledge] Relevance: CLI Troubleshooting

9. While troubleshooting an SSL Decryption issue, which PAN-OS CLI command would you use to check the details of the Forward Trust certificate, Forward Untrust certificate, and SSL Inbound Inspection certificate?

Explanation: The command 'show system setting ssl-decrypt certificate' displays the currently configured certificates used for the various decryption functions, including Forward Trust, Forward Untrust, and those potentially used for Inbound Inspection profiles. [9 (confirms command path)] Relevance: CLI Troubleshooting, Configuration Verification

10. For which type of decrypted traffic are logs NOT generated in the Decryption log file?

Explanation: The documentation explicitly states that Decryption logs are not supported for SSH Proxy traffic. Logs are generated for various SSL/TLS scenarios, including Forward Proxy, Inbound Inspection, and GlobalProtect. Relevance: Log Support Limitations