Decryption Best Practices
Decryption Best Practices
Decryption Best Practices
Version 10.0
paloaltonetworks.com/documentation
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2020-2020 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
October 28, 2020
5
6 DECRYPTION BEST PRACTICES | Decryption Best Practices
© 2020 Palo Alto Networks, Inc.
Plan Your SSL Decryption Best Practice
Deployment
Prepare to deploy decryption by developing a decryption strategy and roll-out plan. Turning on decryption
may change the way users interact with some applications and websites, so planning, testing, and user
education are critical to a successful deployment.
STEP 2 | Work with and educate stakeholders such as legal, finance, HR, executives, security, and IT/
support to develop a decryption deployment strategy.
Get the required approvals to decrypt traffic to secure the enterprise.
Identify and prioritize the traffic to decrypt:
• Decide which applications to decrypt (sanctioned, unsanctioned). Don’t allow encrypted
unsanctioned applications.
• Decide which devices to decrypt (corporate, BYOD, mobile, etc.).
Enterprises don’t control BYOD devices. If you allow BYOD devices on your
network, decrypt their traffic and subject it to the same Security policy that
you apply to other network traffic. To do this, redirect BYOD users through an
Authentication Portal, instruct them how to download and install the CA certificate,
and clearly notify users that their traffic will be decrypted. Educate BYOD users
about the process and include it in your company’s privacy and computer usage
policy.
• Decide if you want to use the same decryption policy for different groups, such as different
employee groups, contractors, partners, and guests.
Identify traffic you can’t decrypt:
• Traffic that breaks decryption for technical reasons such as certificate pinning, unsupported
ciphers, or mutual authentication.
• Traffic that you choose not to decrypt such as financial, health, government, and other sensitive
categories, including users and groups such as executives.
• Fully understand the traffic you except from decryption. You don’t have visibility into encrypted
traffic and the firewall can’t apply threat prevention profiles to encrypted traffic.
Prepare updated legal and HR computer usage policies to distribute to all employees, contractors,
partners, guests, and any other network users so that when you roll out decryption, users understand
their data can be decrypted and scanned for threats.
Place firewalls where they can see all of the network traffic so that no encrypted traffic
inadvertently gains access to your network because it bypasses the firewall.
STEP 3 | Develop a plan for rolling out your public key infrastructure (PKI).
If you have an existing PKI, generate the SSL Forward Trust CA certificate from your Enterprise Root
CA as a subordinate certificate. This makes deployment easier because network devices already trust
the Enterprise Root CA, so you won’t run into certificate issues. If you don’t have an Enterprise Root
CA, consider getting one.
Alternatively, generate a self-signed Root CA certificate on the firewall and create a subordinate
Forward Trust CA certificate on that firewall to install on network devices. Self-signed certificates are
best for small companies that don’t have an Enterprise Root CA and for proof-of-concept (POC) trials.
Similarly to BYOD devices, enterprises don’t control guest devices. If you allow guest
devices on your network, decrypt their traffic and subject it to the same Security policy
that you apply to other network traffic. To do this, redirect guest users through an
Authentication Portal, instruct them how to download and install the CA certificate,
and clearly notify users that their traffic will be decrypted. Include the process in your
company’s privacy and computer usage policy.
Generate separate CA certificates for Forward Trust and Forward Untrust. Do not use the same PKI
subordinate CA for both certificates and do not sign the Forward Untrust certificate with the Trusted
Root CA! The Forward Untrust certificate warns users that the certificate signing the server is not
legitimate and that they should not proceed to the site. If the Trusted Root CA signs the Untrust
certificate, then clients trust certificates that should be untrusted because clients trust the Root CA.
Generate a separate subordinate Forward Trust CA certificate for each firewall. Using separate
subordinate CAs enables you to revoke a certificate when you decommission a device (or device
pair) without affecting the rest of the deployment and reduces the impact if you need to revoke a
certificate. Separate CA certificates help technical support troubleshoot user issues because the
certificate error message includes information about the firewall the traffic traversed. Although using
one Forward Trust subordinate CA on all firewalls is easier to deploy, using a separate certificate on
each firewall provides the best security.
If you need additional security for your private keys, consider storing them in an HSM.
STEP 2 | Configure Decryption profiles to control protocols, certificate verification, and failure handling.
SSL Forward Proxy Decryption profiles control server certificate verification, session modes, and
failure checks for outbound traffic. Block sessions with expired certificates, untrusted issuers,
unsupported versions, and unsupported cipher suites. Block sessions with client authentication unless
an important application requires it, in which case you should create a separate Decryption profile
that allows client authentication and apply it only to traffic that requires client authentication.
SSL Inbound Inspection Decryption profiles control session modes and failure checks for inbound
traffic. Block sessions with unsupported versions and unsupported cipher suites.
SSL Protocol Settings control cipher suite elements: protocol versions, key exchange algorithms,
encryption algorithms, and authentication algorithms for SSL Forward Proxy and SSL Inbound
Inspection traffic. Use the strongest ciphers that you can. For Forward Proxy, set the protocol
Min Version to TLSv1.2 and the Max Version to Max to block weak protocols. For SSL Inbound
Inspection, create separate profiles with protocol settings that match the capabilities of the server(s)
whose inbound traffic you are inspecting.
Use the strongest cipher suite that you can. Create separate Decryption policies and
profiles to maximize security. If legacy sites that you need for business purposes only
support weaker ciphers, create a separate Decryption profile to allow the that traffic
and apply it in a Decryption policy only to the necessary sites. Use the same technique
to fine tune security vs. performance for different URL categories.
Many mobile applications use pinned certificates. Because TLSv1.3 encrypts
certificate information, the firewall can’t automatically add these mobile applications to
The best practice Decryption profile settings for the data center and for the perimeter
(internet gateway) use cases differ slightly from the general best practice settings.
STEP 3 | Configure Decryption policy rules to define the traffic to decrypt and to make policy-based
exceptions for traffic you choose not to decrypt.
Create policy rules to except specific destination IP addresses (for example, finance servers), source
users and groups (for example, executives or HR personnel), source devices, and application ports
that you choose not to decrypt. Place these rules at the top of the Decryption rulebase, before rules
that decrypt traffic. For all traffic except TLSv1.3 traffic, attach a No Decryption profile to them to
apply SSL server certificate verification controls to the encrypted traffic. This prevents inadvertently
decrypting traffic that you don’t want to decrypt.
Use URL Categories, Custom URL Categories, and External Dynamic Lists (EDLs) to specify URLs not
to decrypt, such as financial-services, health-and-medicine, government, and any other categories
you don’t want to decrypt for business, legal, or regulatory reasons. Use an EDL in environments with
dynamically changing IP addresses (for example, Office 365) or frequent membership changes to
update without having to commit.
Create an EDL or Custom URL Category that contains all the categories you choose not to decrypt so
that you only need one Decryption policy rule for them.
Place these rules above rules that decrypt traffic in the Decryption rulebase.
Configure decryption logging and log forwarding.
If you use Decryption mirroring to copy and send decrypted traffic to a traffic collection tool, be
aware of local privacy regulations that may prohibit mirroring or control the traffic you can mirror.
Create policy to decrypt the rest of the traffic by configuring SSL Forward Proxy, SSL Inbound
Inspection, and SSH Proxy rules. Always decrypt the online-storage-and-backup, web-based-email,
web-hosting, personal-sites-and-blogs, content-delivery-networks, and high-risk URL categories.
Limit SSH Proxy to administrators who manage network devices, log all SSH traffic, and configure
Multi-Factor Authentication to prevent unauthorized SSH access.
STEP 4 | Add sites to the SSL Decryption Exclusion list (Device > Certificate Management > SSL
Decryption Exclusion) if they break decryption technically during POC testing and are not
already on the exclusion list. (Decrypting sites that block decryption technically results in
blocking that traffic.)
STEP 5 | In Security policy, block Quick UDP Internet Connections (QUIC) protocol.
Chrome and some other browsers establish sessions using QUIC instead of TLS, but QUIC uses
proprietary encryption that the firewall can’t decrypt, so potentially dangerous traffic may enter the
network as encrypted traffic. Create two rules, one to block the QUIC application on standard ports and
one to block UDP ports 80 and 443. Blocking QUIC forces the browser to use TLS.
STEP 2 | Measure firewall performance to ensure that it’s within acceptable norms and so that you
understand the effect of decryption on performance.
If you want to decrypt more traffic than firewall resources support, scale up so that you have enough
resources to decrypt all of the traffic you want to decrypt and secure your network.
STEP 3 | Educate new employees as you hire them so that they understand your decryption policy and
won’t be surprised if they can’t reach a particular site because it uses weak cipher suites.
STEP 5 | Use decryption troubleshooting tools such as the Application Command Center’s SSL Activity
widgets and the Decryption log (Monitor > Logs > Decryption) to monitor decryption traffic
and solve decryption issues.
Decryption troubleshooting workflow examples show you how to use the tools to investigate issues.
STEP 6 | Use Palo Alto Networks documentation and other resources to learn more about Decryption
and to look up information:
• The PAN-OS Administrator’s Guide provides detailed information about Palo Alto Networks next-
generation firewalls.
• Palo Alto Networks Live community has a Decryption Resource List of articles about decryption
configuration, setup, and administration.
• To find missing intermediate certificates, visit SSL Labs (Qualys).
• To find out which cipher suites a server supports, visit Qualys SSL Labs server SSL test page.
• To check up-to-date statistics on the percentages of different ciphers and protocols in use on the
150,000 most popular sites in the world so you can see trends and understand how widespread
worldwide support is for more secure ciphers and protocols, visit Qualys SSL Labs SSL Pulse page.