While SSL/TLS decryption (both Forward Proxy for outbound and Inbound Inspection) provides essential visibility for security, decrypting *all* traffic is often neither feasible nor desirable. SSL Decryption Exclusions are necessary to bypass decryption for specific traffic flows due to various reasons:
Effectively managing decryption exclusions is crucial for a successful and stable decryption deployment.
PAN-OS provides several ways to exclude traffic, primarily through Decryption Policy rules and a dedicated exclusion list:
Policies > Decryption
No Decrypt
.
Objects > Decryption > Decryption Profile > SSL Decryption > No Decryption
) to these rules. This allows the firewall to perform server certificate validation checks (expiry, trust) on the non-decrypted traffic (except for TLS 1.3+ where the certificate may be encrypted).
Device > Certificate Management > SSL Decryption Exclusion
dropbox.com
,
someapp.internal.corp
). Wildcards are generally not supported here.
Objects > Custom Objects > URL Category
) Group specific FQDNs/URLs for known problematic sites (e.g., create a category named `URL-Pinned-Apps` containing `site1.com`, `app.domain.com`).
Objects > External Dynamic Lists
) Use EDLs of type 'URL' or 'Domain' to manage frequently changing lists (e.g., Office 365 URLs) or lists maintained externally.
Objects > Decryption > Decryption Profile
) Create one or more profiles specifically for excluded traffic. Configure server certificate checks (Block expired, Block untrusted issuer) within the 'No Decryption' tab of the profile.
Policies > Decryption
)
No Decrypt
.
# Example Decryption Policy Order: 1. Name: Exclude_Financial_Health | URL Category: financial-services, health-and-medicine | Action: No Decrypt | Profile: NoDecrypt-CertChecks 2. Name: Exclude_Pinned_Sites | URL Category: URL-Pinned-Apps (Custom) | Action: No Decrypt | Profile: NoDecrypt-CertChecks 3. Name: Exclude_Exec_Group | Source User: executive-group | Action: No Decrypt | Profile: NoDecrypt-CertChecks 4. Name: Decrypt_WebMail_Social | URL Category: web-mail, social-networking | Action: Decrypt | Profile: Outbound-Decrypt-Profile 5. Name: Decrypt_General_HighRisk| URL Category: high-risk, questionable | Action: Decrypt | Profile: Outbound-Decrypt-Profile # ... other decrypt rules ... # Default rule is implicitly 'No Decrypt'
For the PCNSE exam, regarding Decryption Exclusions:
1. What is the primary reason for excluding URL categories like 'financial-services' and 'health-and-medicine' from SSL Forward Proxy decryption?
2. What is the primary mechanism used in PAN-OS to configure policy-based exclusions from decryption (e.g., excluding by URL category or destination)?
3. Where must "No Decrypt" rules be placed in the Decryption Policy rulebase relative to "Decrypt" rules to be effective?
4. What is the primary purpose of the SSL Decryption Exclusion list found under
Device > Certificate Management > SSL Decryption Exclusion
?
5. An administrator creates a "No Decrypt" policy rule for the 'health-and-medicine' URL category. What additional configuration is recommended for this rule?
6. What is the main security risk associated with excluding traffic from decryption?
7. Which object type is commonly used within a "No Decrypt" policy rule to manage a list of frequently changing Office 365 domains that should be excluded?
8. What issue might prevent a "No Decryption" profile from blocking a session to a site with an untrusted issuer certificate?
9. Which of these scenarios is LEAST likely to require a decryption exclusion?
10. A best practice during the initial rollout of SSL decryption is to: