Overview: Decryption Mirror vs. Decryption Broker

Palo Alto Networks firewalls provide robust capabilities to decrypt and inspect encrypted network traffic, such as SSL/TLS and SSH sessions. This decryption is vital for identifying threats hidden within encrypted flows, enforcing security policies accurately, and maintaining regulatory compliance. However, organizations often employ a multi-layered security strategy, utilizing specialized tools for tasks like advanced intrusion detection, data loss prevention (DLP), or forensic analysis. These tools frequently require access to the cleartext (decrypted) traffic to function effectively.

To bridge this gap, Palo Alto Networks offers two distinct features for exporting decrypted traffic:

Choosing between Decryption Mirror and Decryption Broker depends heavily on whether the external tools need to passively observe or actively interact with the traffic flow. This report will explore the operational details, configuration requirements, typical use cases, and limitations of each feature.

Decryption Mirror

Decryption Mirror provides a mechanism to passively monitor decrypted traffic by sending a copy of the cleartext data stream to an external tool without interrupting the primary traffic flow through the firewall.

Workflow

sequenceDiagram
    participant Client
    participant FW as Firewall
    participant Server
    participant MirrorTool as Analysis/DLP Tool

    Client->>+FW: 1. Encrypted Request (HTTPS/SSH)
    Note over FW: Matches Decryption Policy
    FW->>+Server: 2. Encrypted Request forwarded
    Server->>-FW: 3. Encrypted Response
    Note over FW: 4. Performs Decryption (SSL Forward Proxy / Inbound Inspection)
    FW -->> MirrorTool: 5. Copies Decrypted Payload via Mirror Port (Cleartext)
    Note over FW: 6. Applies Security Policies (App-ID, Threat, etc.) to Original Decrypted Flow
    alt Traffic Allowed
        FW->>-Client: 7. Re-encrypts & Forwards Allowed Response
    else Traffic Blocked
        FW--x Client: 7. Blocks Response (based on policy)
    end
             

Detailed traffic flow for Decryption Mirror.

  1. Encrypted traffic arrives at the firewall and matches a Decryption Policy rule configured for decryption (e.g., SSL Forward Proxy or SSL Inbound Inspection).
  2. The firewall performs the necessary decryption steps (e.g., certificate emulation for Forward Proxy, using the server's private key for Inbound Inspection).
  3. If the Decryption Profile applied by the policy rule has "Forward decrypted content" (mirroring) enabled, the firewall duplicates the resulting cleartext packet stream.
  4. This cleartext copy is encapsulated (often with a simulated TCP handshake ) and sent out the specially configured "Decrypt Mirror" interface.
  5. Concurrently , the original (now decrypted) traffic stream continues through the firewall's standard security processing pipeline (App-ID identification, threat scanning, URL filtering, file blocking, etc.).
  6. Based on the security policy outcome for the original stream, the firewall either drops the connection or re-encrypts the allowed traffic and forwards it to its original destination (client or server).
  7. The external tool connected to the mirror port receives the cleartext copy for its analysis or logging purposes but does not send traffic back into the mirror port.

Configuration

Use Cases

Limitations and Considerations

Decryption Broker (Network Packet Broker)

Decryption Broker offers a fundamentally different approach by acting as an orchestrator, redirecting traffic flows through external, inline security devices (a "security chain") for processing, which often includes decryption. This allows organizations to leverage specialized third-party tools for active inspection and enforcement.

Workflow

graph TD
    A[Client] --> B(Firewall Ingress);
    subgraph Firewall
        B --> C{Match Security Policy};
        C -- Allowed --> D{Match Decryption Forwarding Rule?};
        D -- Yes --> E[Redirect to Chain via Broker Interface 1];
        D -- No --> F[Normal FW Processing Decrypt Inspect];
        G[Receive from Chain via Broker Interface 2] --> H{Apply Return Security Policy};
        H -- Allowed --> I[Re-encrypt if needed and Forward];
    end
    subgraph "External Security Chain (Inline)"
        J(Device 1 - e.g., Decryptor) --> K(Device 2 - e.g., IPS/DLP);
        K --> L(Chain Egress);
    end
    E --> J;
    L --> G;
    I --> M[Server];



              

High-level conceptual workflow for Decryption Broker.

  1. Encrypted or cleartext traffic enters the firewall.
  2. Initial Security Policy lookup occurs.
  3. If allowed, the traffic is evaluated against Decryption Forwarding rules ( Policies > Decryption Forwarding ).
  4. If a matching Decryption Forwarding rule is found, instead of proceeding with standard firewall decryption/inspection, the firewall redirects the traffic.
    • The rule specifies a target Security Chain object.
    • The firewall uses the ingress broker interface defined in the Security Chain object to send the traffic out towards the first device in the chain.
    • Traffic can be sent encrypted (for the chain to decrypt) or already decrypted by the firewall itself, depending on the configuration and use case.
  5. The traffic traverses the inline Security Chain, where each third-party device performs its function (e.g., decryption, IPS inspection, DLP enforcement).
  6. The processed traffic exits the last device in the chain and is sent back to the firewall via the egress broker interface defined in the Security Chain object.
  7. The firewall receives the traffic from the chain (often now in cleartext).
  8. The firewall can then perform its own security processing (App-ID, threat prevention, etc.) on this returned, cleartext traffic based on Security Policy rules applied to the zone associated with the egress broker interface.
  9. Finally, if the original flow was encrypted and policy dictates, the firewall re-encrypts the traffic before forwarding it to the ultimate destination.

Where Does Decryption Happen with Broker?

A common point of confusion is whether the Palo Alto Networks firewall still performs decryption when using Decryption Broker. The answer depends on the configuration and the goal:

Therefore, while Decryption Broker *facilitates* offloading decryption, the firewall itself *can* still be the component performing decryption depending on how the Decryption Forwarding Rule's "Traffic Type" option is set (Forward Encrypted vs. Forward Decrypted).

Configuration Elements

Use Cases

Limitations and Considerations

Comparison Summary: Decryption Mirror vs. Broker

Aspect Decryption Mirror Decryption Broker / Network Packet Broker
Primary Action Copies post-decryption traffic Redirects traffic flow (pre or post-decryption by FW)
Traffic Path Passive, out-of-band copy Inline detour through external devices
Source of Decryption Palo Alto Networks Firewall Firewall or (more commonly) external device in chain
External Tool Interaction Passive analysis only Active inline inspection, enforcement, modification possible
Effect on Original Flow Minimal (only decryption overhead) Significant (redirected, processed by external devices, potential latency increase)
Return Path Required? No Yes , traffic must return from chain
Typical Use Cases IDS, Forensics, Passive DLP, Logging Decryption Offload, Inline IPS/DLP/CDR, Service Chaining
Configuration Simpler: Mirror Interface, Decryption Profile, License Complex: Broker Interfaces, Forwarding Rules, Chain Objects, Routes, License
Licensing Free "Decryption Port Mirror" license required Specific Broker/NPB license required (cost varies)
VM/Cloud Support Generally No (not on public cloud/NSX VMs) Platform/version dependent, potentially yes

Performance Considerations

Decryption Mirror

Decryption Broker

Choosing between Mirror and Broker requires balancing the need for inline external processing (Broker) against the desire for passive visibility (Mirror) and considering the performance trade-offs (FW CPU load vs. network latency).

Knowledge Check: Decryption Mirror vs. Broker

Test your understanding of the concepts.

1. What is the primary action of Decryption Mirror?

Explanation: Decryption Mirror's main function is to duplicate the cleartext traffic *after* the firewall decrypts it and send that copy passively to an external tool. Relevance: Core Concept

2. In a Decryption Broker scenario, where does the actual SSL/TLS decryption most commonly occur when offloading is the goal?

Explanation: A primary use case for Decryption Broker is to offload the CPU-intensive decryption task from the firewall to specialized devices within the security chain. Relevance: Core Concept, Use Case

3. Which feature involves redirecting traffic inline through a series of external security devices?

Explanation: Decryption Broker is designed to send traffic through an inline sequence (security chain) of third-party appliances for processing before it returns to the firewall. Relevance: Traffic Flow Difference

4. What specific Interface Type must be configured on a physical port to use Decryption Mirror?

Explanation: To enable Decryption Mirror, you must configure a dedicated physical Ethernet interface on the firewall with the specific "Interface Type" of "Decrypt Mirror". The "Tap" type is for mirroring traffic before decryption. Relevance: Configuration Detail

5. A security team wants to send cleartext traffic to an offline forensic capture system without affecting live traffic flow. Which feature should they use?

Explanation: Decryption Mirror sends a passive copy, ideal for offline/out-of-band tools like forensic systems that don't need to interact with the live flow. Standard port SPAN would mirror encrypted traffic. Relevance: Use Case Scenario

6. What is a primary performance *benefit* often cited for using Decryption Broker?

Explanation: By redirecting encrypted traffic to specialized external decryption appliances, Decryption Broker can free up the firewall's CPU resources that would otherwise be consumed by the decryption process. However, it usually increases latency. Relevance: Performance Consideration

7. In a Decryption Broker configuration, what object defines the ingress/egress interfaces and type (L2/L3) of the external device path?

Explanation: The Security Chain object ( Objects > Decryption > Security Chains ) is where you define the pair of broker interfaces (ingress to the chain, egress from the chain) and specify whether the chain operates at Layer 2 or Layer 3. Relevance: Configuration Detail (Broker)

8. Which statement accurately describes policy enforcement capabilities?

Explanation: Broker sends traffic *inline* through the chain, allowing those devices to actively enforce policy. The firewall also inspects the traffic when it returns. Mirror tools only see a copy and cannot affect the live flow. Relevance: Functional Difference

9. On which platform type is Decryption Mirror explicitly mentioned as *not* supported in the documentation?

Explanation: The documentation consistently states that Decryption Mirror is not supported on VM-Series firewalls deployed in major public clouds or VMware NSX. It is generally supported on various hardware platforms. Relevance: Platform Limitation

10. What is essential for traffic flow in a Decryption Broker setup that is NOT required for Decryption Mirror?

Explanation: Since Decryption Broker redirects the primary traffic path inline, the traffic *must* successfully traverse the external chain and return to the firewall's egress broker interface to continue towards its destination. Mirror is passive and doesn't rely on return traffic. Relevance: Critical Workflow Difference