How to Configure SSL Interception in the Firewall

Similar documents
How to Configure SSL Interception in the Firewall

How to Set Up External CA VPN Certificates

Configuring SSL CHAPTER

Configuring SSL. SSL Overview CHAPTER

Secure Web Appliance. SSL Intercept

Install the ExtraHop session key forwarder on a Windows server

Workspace ONE UEM Integration with RSA PKI. VMware Workspace ONE UEM 1810

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7

VMware AirWatch Integration with RSA PKI Guide

Configuring SSL. SSL Overview CHAPTER

Blue Coat Security First Steps Solution for Controlling HTTPS

AirWatch Mobile Device Management

S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: November 10, 2011

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017

Android Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.

How to Set Up VPN Certificates

Create Decryption Policies to Control HTTPS Traffic

DPI-SSL. DPI-SSL Overview

This document describes the configuration of Secure Sockets Layer (SSL) decryption on the FirePOWER Module using ASDM (On-Box Management).

Using the Terminal Services Gateway Lesson 10

Barracuda Firewall Release Notes 6.6.X

Workspace ONE UEM Certificate Authority Integration with JCCH. VMware Workspace ONE UEM 1810

VMware Horizon View Deployment

SonicOS Enhanced Release Notes

Barracuda Firewall Release Notes 6.5.x

VMware AirWatch Integration with SecureAuth PKI Guide

Module 3 Remote Desktop Gateway Estimated Time: 90 minutes

Access to RTE s Information System by software certificates under Microsoft Windows 7

Scenarios for Setting Up SSL Certificates for View. VMware Horizon 6 6.0

Exinda How To Guide: SSL Acceleration. Exinda ExOS Version Exinda Networks, Inc.

Configuring Certificate Authorities and Digital Certificates

AXIS Device Manager HTTPS certificate management

SonicOS Enhanced Release Notes

Send documentation comments to

Install the ExtraHop session key forwarder on a Windows server

Install the ExtraHop session key forwarder on a Windows server

Scenarios for Setting Up SSL Certificates for View. Modified for Horizon VMware Horizon 7 7.3

CYAN SECURE WEB HOWTO. SSL Intercept

Authentication, Encryption, Transport, IP Version and VPN Routing

Authentication, Encryption, Transport, and VPN Routing

SonicOS Release Notes

NetExtender for SSL-VPN

Managing Certificates

Wavecrest Certificate SHA-512

Install the ExtraHop session key forwarder on a Windows server

Configuring Cisco Unified MeetingPlace Web Conferencing Security Features

UCS Manager Communication Services

SSH Communications Tectia SSH

On-demand target, up and running

VMware Horizon JMP Server Installation and Setup Guide. 13 DEC 2018 VMware Horizon 7 7.7

How to Configure a Remote Management Tunnel for Barracuda NG Firewalls

Content and Purpose of This Guide... 1 User Management... 2

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

SCCM Plug-in User Guide. Version 3.0

How to Configure a Remote Management Tunnel for an F-Series Firewall

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

Start Creating SSL Policies

SSL Accelerated Services. Feature Description

How to configure the UTM Web Application Firewall for Microsoft Remote Desktop Gateway connectivity

Cryptography SSL/TLS. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

This PDF Document was generated for free by the Aloaha PDF Suite If you want to learn how to make your own PDF Documents visit:

Administrator's Guide

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

Configuring SSL Security

If you prefer to use your own SSH client, configure NG Admin with the path to the executable:

Best Practices for Security Certificates w/ Connect

Step-by-step installation guide for monitoring untrusted servers using Operations Manager

Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS)

ms-help://ms.technet.2004apr.1033/ad/tnoffline/prodtechnol/ad/windows2000/howto/mapcerts.htm

Configuring Windows 7 VPN (Agile) Client for authentication to McAfee Firewall Enterprise v8. David LePage - Enterprise Solutions Architect, Firewalls

3. In the upper left hand corner, click the Barracuda logo ( ) then click Settings 4. Select the check box for SPoE as default.

Copyright

VMware Horizon JMP Server Installation and Setup Guide. Modified on 19 JUN 2018 VMware Horizon 7 7.5

Managing SSL/TLS Traffic Flows

Certificate Management

Intercepting Web Requests

DEPLOYMENT GUIDE. SSL Insight Certificate Installation Guide

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Administrator's Guide

Access to RTE s Information System by software certificates under Microsoft Windows Seven

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

Configuring F5 for SSL Intercept

How to Configure S/MIME for WorxMail

How to Configure ATP in the HTTP Proxy

PKI Configuration Examples

IceWarp SSL Certificate Process

Chapter 20 Web VPN/ SSL VPN

GB-OS. Certificate Management. Tel: Fax Web:

Configuring Network Composer and workstations for Full SSL Filtering and Inspection

Odette CA Help File and User Manual

Sophos Mobile in Central

How to Enable Client Certificate Authentication on Avi

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

ISY994 Series Network Security Configuration Guide Requires firmware version Requires Java 1.8+

USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003)

Genesys Security Deployment Guide. What You Need

OCSP Client Tool V2.2 User Guide

Sophos Mobile as a Service

Using Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)

About DPI-SSL. About DPI-SSL. Functionality. Deployment Scenarios

Transcription:

Most applications encrypt outgoing connections with SSL or TLS. SSL Interception decrypts SSL-encrypted traffic to allow Application Control features (such as the Virus Scanner, ATD, URL Filter, Safe Search, or File Content Scan) to inspect encrypted content that would otherwise not be visible to the Firewall service. To avoid certificate errors when the users use SSL-encrypted connections, you must install the SSL Interception root certificate on all client computers. If you are using CRL checks, the CRL/OCSP check is done once per 24h period to reduce the load on the CRL/OCSP server. If an error occurs during the CRL check, it is repeated after 10 minutes. Applications with the application object property not interceptable cannot be intercepted and are automatically excluded from SSL Interception. Open the application object on the Forwarding Rules > Applications page to check if an application is interceptable. You can configure SSL Interception to use a cipher string of your choice. Enable SSL Interception Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall > Security Policy. Click Lock. Select the Enable SSL Interception checkbox. In the Root Certificate section, either select Use self signed certificate or add your certificate by clicking the plus sign (+). The root certificate is used to intercept, proxy, and inspect the HTTP/S session. The Barracuda NG Firewall can then intercept the HTTP/S connections by presenting the client with a CA that was derived from this root CA. When changing the root certificate, the firewall service must be restarted. 5. In the Trusted Root Certificates table, you can extend the default set of trusted root certificates by clicking the plus sign (+). To view the Barracuda NG Firewall's certificate store, click the Show CA Certificates link. 6. Select the Enable CRL Checks checkbox to automatically check for revoked CA certificates. 7. In the Exception Handling section, add domains that should be excluded from SSL Interception. SSLencrypted traffic to and from these domains is not decrypted, although SSL Interception is globally enabled. Domains automatically include all subdomains. E.g., google.com will also includes mail.google.com 8. In the Block Settings section, enter a browser message that should be displayed when traffic is blocked. 9. Click Send Changes and Activate. SSL Interception can now be enabled on a per-access or application rule basis. Configure Advanced SSL Interception Settings For SSL Interception, you can also configure advanced settings such as the number of working instances that are involved in the SSL decryption process, log verbosity, CRL checks, or the used cipher string. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall > Security Policies. Click the Advanced link in the upper right of the Security Policy page. The SSL Interception Advanced window opens. 1 / 5

Change the advanced SSL Interception settings according to your requirements: Number of Workers The number of working instances to be involved in the SSL decryption and encryption process. Default: auto Maximum Workers The maximum number of working instances that decrypt and encrypt SSL connections. When all workers are used, SSL connections are refused. Default: auto Worker Idle Timeout The timeout for the working instances involved in the SSL decryption and encryption process. Default: 0 Log Verbosity You can select one of the following log granularity options: Normal, Verbose, or Debug. Ignore Validation Status Since the clients cannot check the revocation status for server certificates of intercepted SSL connections, you can configure the default validation policy for all intercepted SSL connections for which CRL/OCSP checks could not be performed. Default: Yes Yes The NG Firewall creates a valid certificate for the client as long as the content of the server certificate is validated. No The NG Firewall creates an invalid certificate to let the client know that CRL/OCSP checks could not be performed. SSL version handling Allow (obsolete) SSLv2 Enable if you must support clients that are SSLv3 only. Allow (obsolete) SSLv3 Enable if you must support clients that are SSLv3 only. OpenSSL cipher string You can set a custom cipher string.the Barracuda NG Firewall uses the DEFAULT cipher string of the OpenSSL version used in the firmware by default. Click OK. 5. Click Send Changes and Activate. 2 / 5

Certificate Management SSL Interception process breaks the certificate trust chain. To reestablish the trust chain, you must install the security certificate (root certificate) and, if applicable, intermediate certificates that are used by the SSL Interception engine. Install this certificate on every client in your network. To prevent browser warnings and allow transparent SSL interception, install the security certificate into the operating system's or web browser's certificate store. On the Security Policy page, click the edit icon next to (Self Signed) Certificate and click Export to file. Enter a name, select *.cer as file type, and click Save. Deploy this certificate to the computers in your network. Either create a group policy object or install the certificate manually (MS Certificate Import wizard). Ensure that you deploy the certificate into MS Windows' Trusted Root Certification Authorities certificate store. Mozilla Firefox does not automatically use trusted CA certificates installed in the MS Windows certificate store. Certificate Management with Intermediate Certificate Authorities Intermediate CAs are not directly delivered from the Barracuda NG Firewall to the client. They must be deployed manually from the Microsoft Active Directory PKI. 5. 6. 7. 8. Use Microsoft Internet Explorer and connect to your MS Active Directory Certificate Services server. For example, https://127.0.0.1/certsrv Click Request a Certificate and select advanced certificate request. Click Create and submit a request to this CA and answer all questions with Yes. Select Subordinate Certification Authority from the Certificate Template. Fill out the form below. Select your key size in the Key Options section and select the Mark keys as exportable checkbox. Click Submit and answer all questions with Yes. Click Install this certificate. After the certificate is installed successfully, start the MS Active Directory's management console. 5. 6. 7. 8. 9. 10. Open the Certificates - Current User snap-in. Right-click the Intermediate Certification Authorities\Certificates section and select your certificate. Select All Tasks > Export in the upcoming window. Click Next to proceed. In the Export Private Key window, select Yes, export the private key and proceed. Enter a password and click Next. Select the export destination folder and enter a file name. Click Finish. After the certificate has been exported, rename the file extension from *.pfx to *.p12. Use openssl to extract the private key from your *.p12 file. Enter the following command: 1 openssl.exe pkcs12 -in <filename>.p12 -nocerts -nodes -out privatekey.pem Enter the password entered in step 6. 1 Use openssl to convert the key file to RSA. Enter the following command: openssl.exe rsa -in privatekey.pem -out yourprivatekey.pem 1 You can now import the certificate (*.p12) and private key (*.pem) pair to be used for SSL Interception. 1 Install the certificate (*.p12) and root CA from which the certificate was derived. 3 / 5

SSL Interception for VPN Traffic To use SSL Interception for traffic going through a VPN tunnel, you must create a VPN interface and assign an IP address that is covered by the source route of the VPN tunnel. SSL Interception on Bridged Interfaces SSL Interception can only be used on routed Layer 2 and Layer 3 bridges. Additionally, a default route is needed to carry out CRL checks. For more information, see Bridging. 4 / 5

Figures 5 / 5