How to Configure SSL Interception in the Firewall

Similar documents
How to Configure SSL Interception in the Firewall

SSL Accelerated Services. Feature Description

How to Set Up External CA VPN Certificates

Install the ExtraHop session key forwarder on a Windows server

TLS/sRTP Voice Recording AddPac Technology

Secure Web Appliance. SSL Intercept

Datapath. Encryption

Datapath. Encryption

Barracuda Firewall Release Notes 6.6.X

Verify certificate chain with OpenSSL

SSL Report: ( )

Administrator's Guide

Managing SSL/TLS Traffic Flows

CYAN SECURE WEB HOWTO. SSL Intercept

Create Decryption Policies to Control HTTPS Traffic

How to Set Up VPN Certificates

How to Create a TINA VPN Tunnel between F- Series Firewalls

NETASQ: SSL Proxy. Presentation. Antonino NAPOLI

Start Creating SSL Policies

SonicOS Enhanced Release Notes

Authentication, Encryption, Transport, IP Version and VPN Routing

SSL Report: sharplesgroup.com ( )

Exinda How To Guide: SSL Acceleration. Exinda ExOS Version Exinda Networks, Inc.

This document describes the configuration of Secure Sockets Layer (SSL) decryption on the FirePOWER Module using ASDM (On-Box Management).

Configuring SSL. SSL Overview CHAPTER

Barracuda Firewall Release Notes 6.5.x

How to Configure a Remote Management Tunnel for an F-Series Firewall

VMware Horizon View Deployment

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7

TLS 1.1 Security fixes and TLS extensions RFC4346

FUJITSU Software BS2000 internet Services. Version 3.4A May Readme

Setting up IMAP Mail in Outlook

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

SharkFest 17 Europe. SSL/TLS Decryption. uncovering secrets. Wednesday November 8th, Peter Wu Wireshark Core Developer

Android Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.

Configuring SSL. SSL Overview CHAPTER

How to Configure Virus Scanning in the Firewall

BIG-IP System: SSL Administration. Version

Blue Coat Security First Steps Solution for Controlling HTTPS

Legacy of Heartbleed: MITM and Revoked Certificates. Alexey Busygin NeoBIT

Securing VMware NSX MAY 2014

Cryptography SSL/TLS. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

SonicOS Enhanced Release Notes

About DPI-SSL. About DPI-SSL. Functionality. Deployment Scenarios

IPsec and SSL/TLS. Applied Cryptography. Andreas Hülsing (Slides mostly by Ruben Niederhagen) Dec. 1st, /43

Configuring SSL CHAPTER

Let's Encrypt - Free SSL certificates for the masses. Pete Helgren Bible Study Fellowship International San Antonio, TX

Securing Connections for IBM Traveler Apps. Bill Wimer STSM for IBM Collaboration Solutions December 13, 2016

VMware Horizon JMP Server Installation and Setup Guide. 13 DEC 2018 VMware Horizon 7 7.7

BIG-IP System: SSL Administration. Version

Ecosystem at Large

DPI-SSL. DPI-SSL Overview

Understand the TLS handshake Understand client/server authentication in TLS. Understand session resumption Understand the limitations of TLS

Compatibility Matrix for Cisco Unified Communications Manager and the IM and Presence Service, Release 11.5(1)SU5

SSL Report: printware.co.uk ( )


INSE Lucky 13 attack - continued from previous lecture. Scribe Notes for Lecture 3 by Prof. Jeremy Clark (January 20th, 2014)

Chapter 20 Web VPN/ SSL VPN

Authentication, Encryption, Transport, and VPN Routing

Secure Socket Layer (SSL) for

ATS Test Documentation

Apple Inc. Apple IOS 11 VPN Client on iphone and ipad Guidance Documentation

How to Configure ATP in the Firewall

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney.

VMware Horizon JMP Server Installation and Setup Guide. Modified on 19 JUN 2018 VMware Horizon 7 7.5

Palo Alto Networks PAN-OS

AccessEnforcer Version 4.0 Features List

UCS Manager Communication Services

Wavecrest Certificate SHA-512

SSL Report: bourdiol.xyz ( )

Sophos Firewall Configuring SSL VPN for Remote Access

Access to RTE s Information System by software certificates under Microsoft Windows 7

New in Secomea Release Nice to know information about this release: - Secomea TrustGate 16.0 build public Version: 1.

How to Configure ATP in the HTTP Proxy

A Technology Brief on SSL/TLS Traffic

Workspace ONE UEM Integration with RSA PKI. VMware Workspace ONE UEM 1810

Understanding Traffic Decryption

DoD Wireless Smartphone Security Requirements Matrix Version January 2011

Using the Terminal Services Gateway Lesson 10

Best Practices for Security Certificates w/ Connect

Installing Cisco APIC-EM on a Virtual Machine

Remote Access VPN. Remote Access VPN Overview. Licensing Requirements for Remote Access VPN

Lab 7: Tunnelling and Web Security

FIPS Management. FIPS Management Overview. Configuration Changes in FIPS Mode

How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT

Configuring F5 for SSL Intercept

32c3. December 28, Nick goto fail;

Install the ExtraHop session key forwarder on a Windows server

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

Configure and enable syslog streaming for every Barracuda NextGen Firewall F-Series you want to include in the Splunk App.

VMware AirWatch Integration with RSA PKI Guide

Intercepting Web Requests

Protecting Your Blind Spots Boaz Avigad

How to Configure a Remote Management Tunnel for Barracuda NG Firewalls

Transport Layer Security

Example - Reverse Proxy for Exchange Services

Transport Level Security

Configuring Network Composer and workstations for Full SSL Filtering and Inspection

The SonicWALL SSL-VPN Series

S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: November 10, 2011

Transcription:

Most applications encrypt outgoing connections with SSL or TLS. SSL Interception decrypts SSL-encrypted HTTPS and SMTPS traffic to allow Application Control features (such as the Virus Scanner, ATP, URL Filter, Safe Search, or File Content Scan) to inspect encrypted content that would otherwise not be visible to the Firewall service. To avoid certificate errors when the users use SSL-encrypted connections, you must install the SSL Interception root certificate on all client computers. Clients using HTTP2, SPDY, or QUIC are not intercepted. To SSL intercept traffic from these browsers, block UDP 443 on your firewall or disable the protocol directly in the browser to allow the browsers to fall back to HTTPS. If you are using CRL checks, the CRL/OCSP check is done once per 24h period to reduce the load on the CRL/OCSP server. If an error occurs during the CRL check, it is repeated after 10 minutes. Applications with the application object property not interceptable cannot be intercepted and are automatically excluded from SSL Interception. Open the application object on the Forwarding Rules > Applications page to check if an application is interceptable. You can configure SSL Interception to use a cipher string of your choice. The F-Series uses the following default cipher string: HIGH:!aECDH:!ADH:!3DES:!MD5:!DSS:!RC4:!EXP:!eNULL:!NULL:!aNULL. If necessary, you can also set a custom cipher string using the ciphers from the following list: Click here to see the list of supported ciphers... AES128-GCM-SHA256 AES128-SHA AES128-SHA256 AES256-GCM-SHA384 AES256-SHA AES256-SHA256 CAMELLIA128-SHA CAMELLIA256-SHA DHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES128-SHA DHE-RSA-AES128-SHA256 DHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-SHA DHE-RSA-AES256-SHA256 DHE-RSA-CAMELLIA128-SHA DHE-RSA-CAMELLIA256-SHA ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES128-SHA256 ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES256-SHA ECDHE-ECDSA-AES256-SHA384 ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA ECDHE-RSA-AES256-SHA384 PSK-AES128-CBC-SHA PSK-AES256-CBC-SHA 1 / 5

SRP-AES-128-CBC-SHA SRP-AES-256-CBC-SHA SRP-RSA-AES-128-CBC-SHA SRP-RSA-AES-256-CBC-SHA Before You Begin Enable Application Control. For more information, see How to Enable Application Control. Step 1. Enable SSL Interception 1. 2. 3. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall > Security Policy. Click Lock. Select the Enable SSL Interception check box. 4. In the Root Certificate section, either select Use self signed certificate or add your certificate by clicking the plus sign (+). The root certificate is used to intercept, proxy, and inspect SSL-encrypted connections. For HTTPS, the Barracuda NextGen Firewall F-Series uses the root certificate to present the client with an SSL certificate derived from this root CA. When changing the root certificate, go to CONTROL > Server and restart the Firewall service. 5. In the Trusted Root Certificates table, you can extend the default set of trusted root certificates by clicking the plus sign (+). To view the F-Series Firewall's certificate store, click the Show CA Certificates link. 6. Select the Enable CRL Checks check box to automatically check for revoked certificates. 7. In the Exception Handling section, add domains that should be excluded from SSL Interception. SSLencrypted traffic to and from these domains is not decrypted, although SSL Interception is globally enabled. Domains automatically include all subdomains. E.g., google.com will also include mail.google.com 8. Click Send Changes and Activate. SSL Interception can now be enabled on a per-access or application rule basis. Step 2. Configure Advanced SSL Interception Settings For SSL Interception, you can also configure advanced settings such as the number of working instances that are involved in the SSL decryption process, log verbosity, CRL checks, or the used cipher string. 1. 2. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall > Security Policies. Click the Advanced link in the upper right of the Security Policy page. The SSL Interception Advanced window opens. 3. Change the advanced SSL Interception settings according to your requirements: Number of Workers The number of working instances to be involved in the SSL decryption and encryption process. Default: auto 2 / 5

Protocol Error Policy If the firewall cannot interpret the HTTP or SMTP connection this policy is enforced: continue The invalid HTTP or SMTP traffic is forwarded directly bypassing all further firewall policies such as virus scanner, URL Filter, etc... close The invalid HTTP or SMTP connection is closed. RSA Key Size Select the key size used for the dynamic SSL certificates. Log Verbosity You can select one of the following log granularity options: debug, info, notice, warning, or error. CRL Error Policy Since the clients cannot check the revocation status for server certificates of intercepted SSL connections, you can configure the default validation policy for all intercepted SSL connections for which CRL/OCSP checks could not be performed. Default: Yes Ignore The F-Series creates a valid certificate for the client as long as the content of the server certificate is validated. Fail The F-Series creates an invalid certificate to let the client know that CRL/OCSP checks could not be performed. SSL Version Handling Allow (obsolete) SSLv2 Enable if you must support clients, or remote mail servers, that are SSLv2 only. Allow (obsolete) SSLv3 Enable if you must support clients, or remote mail servers, that are SSLv3 only. OpenSSL Cipher String You can set a custom cipher string. The F-Series uses the following default cipher string: HIGH:!aECDH:!ADH:!3DES:!MD5:!DSS:!RC4:!EXP:!eNULL:!NULL:!aNULL. 4. 5. Click OK. Click Send Changes and Activate. Certificate Management The SSL Interception process breaks the certificate trust chain. To reestablish the trust chain, you must install the security certificate (root certificate) and, if applicable, intermediate certificates that are used by the SSL Interception engine. Install this certificate on every client in your network. To prevent browser warnings and allow transparent SSL interception, install the security certificate into the operating system's or web browser's certificate store. 1. On the Security Policy page, click the edit icon next to (Self Signed) Certificate and click Export to file. 2. Enter a name, select *.cer as file type, and click Save. 3. Deploy this certificate to the computers in your network. Either create a group policy object, or install the certificate manually (MS Certificate Import wizard). Ensure that you deploy the certificate into the MS Windows Trusted Root Certification Authorities certificate store. Mozilla Firefox does not automatically use trusted CA certificates installed in the MS Windows certificate store. SSL Interception for SMTPS Traffic The F-Series supports SSL Interception for incoming and outgoing SSL encrypted SMTP connections using the SSL certificate of your mail server. For more information, see How to Configure Mail Security in the Firewall. SSL Interception for HTTPS Traffic The F-Series supports SSL Interception for incoming and outgoing SSL-encrypted HTTP connections. 3 / 5

For more information, see How to Configure Virus Scanning in the Firewall for Web Traffic. SSL Interception for VPN Traffic To use SSL Interception for traffic going through a VPN tunnel, you must create a VPN interface and assign an IP address that is covered by the source route of the VPN tunnel. SSL Interception on Bridged Interfaces SSL Interception can only be used on routed Layer 2 and Layer 3 bridges. Additionally, a default route is needed to carry out CRL checks. For more information, see Bridging. 4 / 5

Figures 5 / 5