PAN-OS: Configuring Decryption Logging

Importance of Decryption Logging

When you implement SSL/TLS Decryption (either Forward Proxy or Inbound Inspection), enabling appropriate logging is crucial for visibility, troubleshooting, and compliance. Decryption logs provide insights into:

This information helps administrators verify that decryption policies are working as intended, identify applications or sites causing issues with decryption, and investigate potential security incidents related to encrypted traffic.

Configuration Steps

Step 1: Enable Logging in Decryption Policy Rules

  1. Configure the decryption traffic you want to log in a decryption policy rule ( Policies > Decryption ).

By default, the NGFW logs only unsuccessful TLS handshakes:

Decryption Policy rule Actions tab showing log settings

Log successful handshakes as well as unsuccessful handshakes to gain visibility into as much decrypted traffic as your device’s available resources permit.

Best Practice: Log successful handshakes for decryption rules to gain visibility, but be prepared to manage the increased log volume (see Step 3). Follow decryption best practices and decrypt as much traffic as is feasible and appropriate.

Step 2: Configure Log Forwarding (Optional but Recommended)

  1. Create a Log Forwarding profile to forward decryption logs to log collectors, other storage devices, or specific administrators, and then specify the profile in the Log Forwarding field of the decryption policy rule Options tab.

To forward decryption logs, you must configure a Log Forwarding profile ( Objects > Log Forwarding ) to specify the decryption Log Type and method of forwarding the logs .

Log Forwarding Profile configuration showing Decryption log type selected

Store forwarded decryption logs securely because they contain sensitive information.

Step 3: Configure Log Storage Quotas (If Logging Locally)

  1. If you log successful TLS handshakes in addition to unsuccessful TLS handshakes, configure a larger log storage space quota ( Device > Setup > Management > Logging and Reporting Settings > Log Storage ) for decryption logs.

The default quota (allocation) is one percent of the device’s log storage capacity for decryption logs and one percent for the general decryption summary. There is no default allocation for hourly, daily, or weekly decryption summaries.

Logging and Reporting Settings showing log storage quotas

Many factors determine the amount of storage you might need for decryption logs and they depend on your deployment. For example, take these factors into account:

The total combined allocation of log quotas cannot exceed 100% of the available NGFW log resources.

You may need to experiment to find the right quota for each log category in your particular deployment. If you only log unsuccessful handshakes, you could start with the default or increase the allocation to two or three percent. If you log both successful and unsuccessful handshakes, you could start by allocating about half of the space to decryption logs that you allocate to Traffic logs. The logs from which you take the space to allocate to decryption logs depends on your traffic, your business, and your monitoring requirements.

PCNSE Exam Focus

For the PCNSE exam, understand: