SSH Proxy is the Palo Alto Networks feature for decrypting and inspecting Secure Shell (SSH) traffic. While SSH provides essential confidentiality for remote administration and file transfers (like SCP and SFTP), its encrypted nature creates a blind spot for security inspection. Malicious actors can abuse SSH tunnels for:
By enabling SSH Proxy decryption, the firewall can gain visibility into the SSH payload, allowing App-ID to potentially identify tunneled applications and enabling Threat Prevention (Anti-Spyware, Vulnerability Protection), File Blocking , and potentially Data Filtering profiles to inspect the content within SSH sessions.
This is distinct from SSL/TLS decryption, targeting port 22 (or other ports running SSH) specifically.
Similar to SSL Forward Proxy, SSH Proxy operates as a Man-in-the-Middle (MITM):
The firewall essentially acts as an SSH proxy server, terminating the client's connection and initiating a new one to the destination server.
Objects > Decryption > Decryption Profile
Add
or edit an existing profile. Name it (e.g., `SSH-Proxy-Inspect-Profile`).
These settings ensure only relatively secure SSH parameters are allowed through the decrypted session.
Policies > Decryption
Add
.
service-ssh
(for TCP/22) or a custom service object if SSH runs on a non-standard port.
Policies > Security
) that allows the SSH traffic (e.g., Source `Trust`, Dest `Untrust`, Application
`ssh`
, Service
`service-ssh`
, Action `Allow`).
Commit the configuration to the firewall.
sequenceDiagram participant Client as SSH Client participant FW as Firewall (SSH Proxy) participant Server as SSH Server Client->>+FW: 1. Initiate SSH Connection (to Server IP/Port 22) Note over FW: Decryption Policy matches (SSH Proxy) FW->>+Server: 2. Initiate SSH Connection Server-->>FW: 3. Presents Real Server Host Key Note over FW: Firewall validates/stores server key (optional) FW-->>Client: 4. Presents Firewall's Proxy Host Key alt Client Trusts/Accepts Key Client->>FW: 5a. Key Accepted, Continue SSH Handshake FW->>Server: 5b. Complete Handshake with Server Client-->>FW: 6a. Encrypted Session (Client <-> FW) FW-->>Server: 6b. Encrypted Session (FW <-> Server) Note over FW: Decrypt Client Traffic -> Inspect -> Re-encrypt for Server (and vice-versa) else Client Rejects Key Client-->>FW: 7. Key Rejected / Connection Error! end deactivate FW deactivate ServerSimplified SSH Proxy Decryption Flow.
For the PCNSE exam, regarding SSH Proxy:
1. What is the primary goal of configuring SSH Proxy decryption on a PAN-OS firewall?
2. How does the firewall handle server authentication during SSH Proxy decryption?
3. What is the most significant operational challenge or caveat when implementing SSH Proxy?
4. Where is SSH Proxy decryption enabled for specific traffic flows?
5. To detect malware being transferred via SFTP (SSH File Transfer Protocol), which two configurations are essential?
6. What settings are configured within the SSH Proxy tab of a Decryption Profile?
7. If SSH Proxy decryption is enabled, what Application ID will typically be shown in the Traffic logs for the decrypted session?
8. A Security Policy rule allowing App-ID `ssh` has Threat Prevention profiles applied. SSH Proxy is NOT enabled via Decryption policy. Can the Threat Prevention profiles inspect the SSH payload?
9. What is a recommended best practice when implementing SSH Proxy decryption?
10. If an administrator disables strict host key checking on client machines to make SSH Proxy work smoothly, what is the associated security risk?