When you implement SSL/TLS Decryption (either Forward Proxy or Inbound Inspection), enabling appropriate logging is crucial for visibility, troubleshooting, and compliance. Decryption logs provide insights into:
This information helps administrators verify that decryption policies are working as intended, identify applications or sites causing issues with decryption, and investigate potential security incidents related to encrypted traffic.
Policies > Decryption
).
By default, the NGFW logs only unsuccessful TLS handshakes:
Log successful handshakes as well as unsuccessful handshakes to gain visibility into as much decrypted traffic as your device’s available resources permit.
Best Practice: Log successful handshakes for decryption rules to gain visibility, but be prepared to manage the increased log volume (see Step 3). Follow decryption best practices and decrypt as much traffic as is feasible and appropriate.
To forward decryption logs, you must configure a Log Forwarding profile (
Objects > Log Forwarding
) to specify the decryption
Log Type
and method of
forwarding the logs
.
Store forwarded decryption logs securely because they contain sensitive information.
Device > Setup > Management > Logging and Reporting Settings > Log Storage
) for decryption logs.
The default quota (allocation) is one percent of the device’s log storage capacity for decryption logs and one percent for the general decryption summary. There is no default allocation for hourly, daily, or weekly decryption summaries.
Many factors determine the amount of storage you might need for decryption logs and they depend on your deployment. For example, take these factors into account:
The total combined allocation of log quotas cannot exceed 100% of the available NGFW log resources.
You may need to experiment to find the right quota for each log category in your particular deployment. If you only log unsuccessful handshakes, you could start with the default or increase the allocation to two or three percent. If you log both successful and unsuccessful handshakes, you could start by allocating about half of the space to decryption logs that you allocate to Traffic logs. The logs from which you take the space to allocate to decryption logs depends on your traffic, your business, and your monitoring requirements.
For the PCNSE exam, understand: