A vast majority of modern web and application traffic, including malware delivery and command-and-control (C2) communication, is encrypted using SSL/TLS. While WildFire is designed to analyze unknown files and links, it cannot analyze what it cannot see. If malicious files or links are hidden within encrypted sessions, the firewall's standard WildFire submission mechanisms (based on file type identification) will be bypassed.
Therefore, SSL Decryption (specifically SSL Forward Proxy for outbound traffic and potentially SSL Inbound Inspection for inbound traffic) is a critical prerequisite for enabling effective WildFire analysis of files transferred over encrypted channels like HTTPS, SMTPS, IMAPS, POP3S, etc.
This page focuses on how to ensure that files revealed through the decryption process are correctly forwarded to WildFire for analysis.
When both SSL Decryption and WildFire Analysis are configured, the process for handling an encrypted file download (e.g., via HTTPS) typically follows these steps:
The key is that the WildFire Analysis profile operates on the *decrypted* data stream made visible by the SSL Decryption process and allowed by the Security Policy.
graph TD Client[Internal Client] -- 1. HTTPS Request --> FW(Firewall); subgraph Firewall Processing Stages subgraph Stage 1: Decryption DecPol{Decryption Policy\n*Action: Decrypt*\n*Type: SSL Fwd Proxy*} -- Matches --> Traffic; Traffic --> DecryptEng[Decryption Engine\n*Performs MITM*]; end subgraph Stage 2: Security Policy & Inspection DecryptEng --> CleartextStream[Cleartext Data Stream]; CleartextStream --> SecPol{Security Policy\n*Action: Allow*\n*Applies Profiles*}; SecPol -- Applies --> AVProf(Antivirus Profile\n*Incl. WF Verdict Actions*); SecPol -- Applies --> WFProf(WildFire Analysis Profile); SecPol -- Applies --> OtherProf(Threat, URL, File Profiles...); WFProf -- Checks File Type/App/Dir --> FileCheck{Is this file\ntype/app/dir\nin WF Profile?}; end subgraph Stage 3: WildFire Submission FileCheck -- Yes & Unknown Verdict --> ForwardWF[Forward Decrypted\nFile to WildFire]; ForwardWF --> WFCloud[WildFire Cloud/\nAppliance]; FileCheck -- No or Known Verdict --> SkipWF(Do Not Forward); end end CleartextStream --> ClientDelivery[Forward to Client\n*Unless WF Hold Mode*]; WFCloud -- Verdict --> FW; linkStyle 0 stroke:#007bff,stroke-width:1px; linkStyle 1 stroke:#dc3545,stroke-width:1px,color:red; linkStyle 2 stroke:#6f42c1,stroke-width:1px,color:purple; linkStyle 3 stroke:#17a2b8,stroke-width:1px,color:teal; linkStyle 4 stroke:#28a745,stroke-width:1px,color:green; linkStyle 5 stroke:#28a745,stroke-width:1px,color:green; linkStyle 6 stroke:#28a745,stroke-width:1px,color:green; linkStyle 7 stroke:#28a745,stroke-width:1px,color:green; linkStyle 8 stroke:#ffc107,stroke-width:1px,color:orange; linkStyle 9 stroke:#fd7e14,stroke-width:2px,color:darkorange; linkStyle 10 stroke:#adb5bd,stroke-width:1px,color:gray,stroke-dasharray: 5 5; linkStyle 11 stroke:#007bff,stroke-width:1px; linkStyle 12 stroke:#6c757d,stroke-width:1px,stroke-dasharray: 5 5;Workflow: Decryption Enables WildFire Analysis.
To ensure decrypted traffic is forwarded to WildFire, verify the following:
Decrypt
and Type
SSL Forward Proxy
(or
SSL Inbound Inspection
) must match the encrypted traffic flow.
Objects > Security Profiles > WildFire Analysis
specifying the desired file types, applications (`any` recommended), and direction (`both` recommended).
Allow
.
A common mistake is attaching the WildFire Analysis profile only to a Decryption policy rule. This will NOT work. The WildFire Analysis profile must be attached to the Security Policy rule that permits the (potentially decrypted) application flow.
Monitor > Logs > WildFire Submissions
to confirm decrypted files are being forwarded.
Device > Setup > Content-ID > Content-ID Settings
- Requires Superuser) Ensure this option is enabled if you specifically need *decrypted SSL content itself* analyzed by WildFire (beyond just file extraction). This is usually enabled by default when decryption is active but worth verifying if issues arise.
Device > Setup > WildFire
) apply to decrypted files as well.
For the PCNSE exam, regarding WildFire and Decryption:
1. Can WildFire analyze a file downloaded by a user over an standard HTTPS connection if SSL Forward Proxy decryption is NOT enabled?
2. A firewall successfully decrypts an HTTPS session containing an unknown executable file download. Which policy object determines IF this specific decrypted file should be forwarded to WildFire?
3. To enable WildFire submission for decrypted traffic, where should the WildFire Analysis Profile be applied?
4. An administrator has decryption enabled but notices no files downloaded over HTTPS are being submitted to WildFire. What is a likely configuration error?
5. Which component performs the actual decryption before WildFire analysis can occur on an SSL/TLS session?
6. True or False: If SSL Decryption is enabled, ALL files transferred over decrypted sessions are automatically sent to WildFire.
7. What potential impact should be considered when enabling both SSL Decryption and WildFire forwarding for high-volume traffic?
8. A Security Policy allows `ssl` and `web-browsing` and has a WildFire Analysis profile attached. A Decryption policy decrypts the 'Social Networking' category. A user downloads an unknown PDF via Facebook (HTTPS). Will the PDF be submitted to WildFire?
9. What firewall log should be checked to confirm that specific files *forwarded* due to decryption are being analyzed by WildFire?
10. True or False: Attaching a WildFire Analysis profile to a Decryption Policy rule is the correct way to ensure decrypted files are submitted.